Cryptographic Hardware and Embedded Systems - CHES 2005加密硬件與嵌入系統(tǒng) - CHES 2005 /會議錄

出版時間:2005-9  出版社:北京燕山出版社  作者:Rao, Josyula R.; Sunar, Berk;  頁數(shù):458  

內(nèi)容概要

This book constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005, held in Edinburgh, UK in August/September 2005. The 32 revised full papers presented were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on side channels, arithmetic for cryptanalysis, low resources, special purpose hardware, hardware attacks and countermeasures, arithmetic for cryptography, trusted computing, and efficient hardware.

書籍目錄

Side Channels Ⅰ  Resistance of Randomized Projective Coordinates Against Power Analysis  Templates as Master Keys  A Stochastic Model for Differential Side Channel Cryptanalysis  Arithmetic for Cryptanalysis    A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis    Further Hidden Markov Model Cryptanalysis  Low Resources    Energy-Efficient Software Implementation of Long Integer Modular Arithmetic    Short Memory Scalar MultiDlication on Koblitz Curves    Hardware/Software Co-design for Hyperelliptic Curve Cryptography(HECC) on the 8051 uP  Special Purpose Hardware    SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers    Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer  Factorization    Design of Testable Random Bit Generators  Hardware Attacks and Countermeasures I    Successfully Attacking Masked AES Hardware Implementations    Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints    Masking at Gate Level in the Presence of Glitches  Arithmetic for Cryptography    Bipartite Modular Multiplication    Fast Truncated Multiplication for Cryptographic Applications    Using an RSA  Accelerator for Modular Inversion    Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite RingsSide Channel Ⅱ (EM)  EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA  Security Limits for Compromising Emanations  Security Evaluation Against Electromagnetic Analysis at Design TimeSide Channel Ⅲ   Trusted Computing   Hardware Attacks and Countermeasures Ⅱ  Hardware Attacks and Countermeasures Ⅲ  Efficient Hardwate Ⅰ  Efficient Hardwate ⅡAuthor Index

圖書封面

評論、評分、閱讀與下載


    Cryptographic Hardware and Embedded Systems - CHES 2005加密硬件與嵌入系統(tǒng) - CHES 2005 /會議錄 PDF格式下載


用戶評論 (總計0條)

 
 

 

250萬本中文圖書簡介、評論、評分,PDF格式免費下載。 第一圖書網(wǎng) 手機版

京ICP備13047387號-7