出版時間:2005-9 出版社:北京燕山出版社 作者:Rao, Josyula R.; Sunar, Berk; 頁數(shù):458
內(nèi)容概要
This book constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005, held in Edinburgh, UK in August/September 2005. The 32 revised full papers presented were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on side channels, arithmetic for cryptanalysis, low resources, special purpose hardware, hardware attacks and countermeasures, arithmetic for cryptography, trusted computing, and efficient hardware.
書籍目錄
Side Channels Ⅰ Resistance of Randomized Projective Coordinates Against Power Analysis Templates as Master Keys A Stochastic Model for Differential Side Channel Cryptanalysis Arithmetic for Cryptanalysis A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis Further Hidden Markov Model Cryptanalysis Low Resources Energy-Efficient Software Implementation of Long Integer Modular Arithmetic Short Memory Scalar MultiDlication on Koblitz Curves Hardware/Software Co-design for Hyperelliptic Curve Cryptography(HECC) on the 8051 uP Special Purpose Hardware SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization Design of Testable Random Bit Generators Hardware Attacks and Countermeasures I Successfully Attacking Masked AES Hardware Implementations Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints Masking at Gate Level in the Presence of Glitches Arithmetic for Cryptography Bipartite Modular Multiplication Fast Truncated Multiplication for Cryptographic Applications Using an RSA Accelerator for Modular Inversion Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite RingsSide Channel Ⅱ (EM) EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA Security Limits for Compromising Emanations Security Evaluation Against Electromagnetic Analysis at Design TimeSide Channel Ⅲ Trusted Computing Hardware Attacks and Countermeasures Ⅱ Hardware Attacks and Countermeasures Ⅲ Efficient Hardwate Ⅰ Efficient Hardwate ⅡAuthor Index
圖書封面
評論、評分、閱讀與下載
Cryptographic Hardware and Embedded Systems - CHES 2005加密硬件與嵌入系統(tǒng) - CHES 2005 /會議錄 PDF格式下載