+612 9045 4394
 
CHECKOUT
Cryptographic Hardware and Embedded Systems - Ches 2001 : Third International Workshop, Paris, France, May 14-16, 2001 Proceedings - Cetin K. Koc

Cryptographic Hardware and Embedded Systems - Ches 2001

Third International Workshop, Paris, France, May 14-16, 2001 Proceedings

By: Cetin K. Koc (Editor), David Nacchae (Editor), Christof Paar (Editor)

Paperback

Published: 15th August 2001
Ships: 5 to 9 business days
5 to 9 business days
$158.39
or 4 easy payments of $39.60 with Learn more

These are the proceedings of CHES 2001, the third Workshop on Cryptographic Hardware and Embedded Systems. The ?rst two CHES Workshops were held in Massachusetts, and this was the ?rst Workshop to be held in Europe. There was a large number of submissions this year, and in response the technical program was extended to 2 1/2 days. As is evident by the papers in these proceedings, many excellent submissions were made. Selecting the papers for this year's CHES was not an easy task, and weregretthatwehadtorejectseveralveryinterstingpapersduetotheac l kof time. There were 66 submitted contributions this year, of which 31, or 47%, were selected for presentation. If we look at the number of submitted papers at CHES '99 (42 papers) and CHES 2001 (51 papers), we observe a steady increase. We interpret this as a continuing need for a workshop series which combines theory and practice for integrating strong security features into modern communications and computer applications. In addition to the submitted contributions, Ross Anderson from Cambridge University, UK, and Adi Shamir from The Weizmann Institute, Israel, gave invited talks. As in previous years, the focus of the workshop is on all aspects of cryp- graphichardwareandembeddedsystemdesign.Ofspecialinterestwerecont- butions that describe new methods for e?cient hardware implementations and high-speed software for embedded systems, e.g., smart cards, microprocessors, DSPs, etc. CHES also continues to be an important forum for new theoretical andpractical?ndingsintheimportantandgrowing?eldofside-channelattacks.

Protecting Embedded Systems - The Next Ten Yearsp. 1
A Sound Method for Switching between Boolean and Arithmetic Maskingp. 3
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardwarep. 16
Random Register Renaming to Foil DPAp. 28
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacksp. 39
Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithmp. 51
High Performance Single-Chip FPGA Rijndael Algorithmp. 65
Two Methods of Rijndael Implementation in Reconfigurable Hardwarep. 77
Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessorp. 93
Efficient Online Tests for True Random Number Generatorsp. 103
The Hessian Form of an Elliptic Curvep. 118
Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curvep. 126
Generating Elliptic Curves of Prime Orderp. 142
New Directions in Croptographyp. 159
A New Low Complexity Parallel Multiplier for a Class of Finite fieldsp. 160
Efficient Rijndael Encryption Implementation with Composite Field Arithmeticp. 171
High-Radix Design of a Scalable Modular Multiplierp. 185
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2[superscript m])p. 202
Attacks on Cryptoprocessor Transaction Setsp. 220
Bandwidth-Optimal Kleptographic Attacksp. 235
Electromagnetic Analysis: Concrete Resultsp. 251
NTRU in Constrained Devicesp. 262
Transparent Harddisk Encryptionp. 273
Sliding Windows Succumbs to Big Mac Attackp. 286
Universal Exponentiation Algorithm: A First Step towards Provable SPA-Resistancep. 300
An Implementation of DES and AES, Secure against Some Attacksp. 309
Efficient Implementation of "Large" Stream Cipher Systemsp. 319
Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEAp. 333
A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardwarep. 348
Implementation of RSA Algorithm Based on RNS Montgomery Multiplicationp. 364
Protections against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approachp. 377
Preventing SPA/DPA in ECC Systems Using the Jacobi Formp. 391
Hessian Elliptic Curves and Side-Channel Attacksp. 402
Author Indexp. 411
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540425212
ISBN-10: 3540425217
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 418
Published: 15th August 2001
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.24
Weight (kg): 0.6