LEADER 05345nam 22007575 450 001 9910143609103321 005 20200704070726.0 010 $a3-540-44499-8 024 7 $a10.1007/3-540-44499-8 035 $a(CKB)1000000000211364 035 $a(SSID)ssj0000322392 035 $a(PQKBManifestationID)11246291 035 $a(PQKBTitleCode)TC0000322392 035 $a(PQKBWorkID)10287582 035 $a(PQKB)10190172 035 $a(DE-He213)978-3-540-44499-2 035 $a(MiAaPQ)EBC3072121 035 $a(PPN)155180916 035 $a(EXLCZ)991000000000211364 100 $a20121227d2000 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptographic Hardware and Embedded Systems - CHES 2000 $eSecond International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings /$fedited by Cetin K. Koc, Christof Paar 205 $a1st ed. 2000. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2000. 215 $a1 online resource (XII, 360 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1965 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-41455-X 320 $aIncludes bibliographical references and index. 327 $aInvited Talk -- Software Implementation of Elliptic Curve Cryptography over Binary Fields -- Implementation of Elliptic Curve Cryptosystems -- Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA -- A High-Performance Reconfigurable Elliptic Curve Processor for GF(2m) -- Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor -- Power and Timing Analysis Attacks -- Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies -- Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards -- Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems -- A Timing Attack against RSA with the Chinese Remainder Theorem -- Hardware Implementation of Block Ciphers -- A Comparative Study of Performance of AES Final Candidates Using FPGAs -- A Dynamic FPGA Implementation of the Serpent Block Cipher -- A 12 Gbps DES Encryptor/Decryptor Core in an FPGA -- A 155 Mbps Triple-DES Network Encryptor -- Hardware Architectures -- An Energy Efficient Reconfigurable Public-Key Cryptography Processor Architecture -- High-Speed RSA Hardware Based on Barret?s Modular Reduction Method -- Data Integrity in Hardware for Modular Arithmetic -- A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals -- Invited Talk -- How to Explain Side-Channel Leakage to Your Kids -- Power Analysis Attacks -- On Boolean and Arithmetic Masking against Differential Power Analysis -- Using Second-Order Power Analysis to Attack DPA Resistant Software -- Differential Power Analysis in the Presence of Hardware Countermeasures -- Arithmetic Architectures -- Montgomery Multiplier and Squarer in GF(2m) -- A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m) -- Montgomery Exponentiation with no Final Subtractions: Improved Results -- Physical Security and Cryptanalysis -- Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses -- Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis -- New Schemes and Algorithms -- MiniPASS: Authentication and Digital Signatures in a Constrained Environment -- Efficient Generation of Prime Numbers. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1965 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aSpecial purpose computers 606 $aLogic design 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aLogic Design$3https://scigraph.springernature.com/ontologies/product-market-codes/I12050 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aSpecial purpose computers. 615 0$aLogic design. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aLogic Design. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8/2 702 $aKoc$b Cetin K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPaar$b Christof$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aCHES 2000 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143609103321 996 $aCryptographic Hardware and embedded systems-CHES 2000$9875530 997 $aUNINA