LEADER 06833nam 22008655 450 001 996465530903316 005 20200702215114.0 010 $a3-642-04138-8 024 7 $a10.1007/978-3-642-04138-9 035 $a(CKB)1000000000772859 035 $a(SSID)ssj0000317072 035 $a(PQKBManifestationID)11237293 035 $a(PQKBTitleCode)TC0000317072 035 $a(PQKBWorkID)10286444 035 $a(PQKB)11767842 035 $a(DE-He213)978-3-642-04138-9 035 $a(MiAaPQ)EBC3064472 035 $a(PPN)139955380 035 $a(EXLCZ)991000000000772859 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptographic Hardware and Embedded Systems - CHES 2009$b[electronic resource] $e11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings /$fedited by Christophe Clavier, Kris Gaj 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XVI, 472 p.) 225 1 $aSecurity and Cryptology ;$v5747 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-04137-X 320 $aIncludes bibliographical references and index. 327 $aSoftware Implementations -- Faster and Timing-Attack Resistant AES-GCM -- Accelerating AES with Vector Permute Instructions -- SSE Implementation of Multivariate PKCs on Modern x86 CPUs -- MicroEliece: McEliece for Embedded Devices -- Invited Talk 1 -- Physical Unclonable Functions and Secure Processors -- Side Channel Analysis of Secret Key Cryptosystems -- Practical Electromagnetic Template Attack on HMAC -- First-Order Side-Channel Attacks on the Permutation Tables Countermeasure -- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA -- Differential Cluster Analysis -- Side Channel Analysis of Public Key Cryptosystems -- Known?Plaintext?Only Attack on RSA?CRT with Montgomery Multiplication -- A New Side-Channel Attack on RSA Prime Generation -- Side Channel and Fault Analysis Countermeasures -- An Efficient Method for Random Delay Generation in Embedded Software -- Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers -- A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques -- A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions -- Invited Talk 2 -- Crypto Engineering: Some History and Some Case Studies -- Pairing-Based Cryptography -- Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers -- Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves -- Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves -- New Ciphers and Efficient Implementations -- KATAN and KTANTAN ? A Family of Small and Efficient Hardware-Oriented Block Ciphers -- Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security -- Elliptic Curve Scalar Multiplication Combining Yao?s Algorithm and Double Bases -- TRNGs and Device Identification -- The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators -- Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs -- CDs Have Fingerprints Too -- Invited Talk 3 -- The State-of-the-Art in IC Reverse Engineering -- Hot Topic Session: Hardware Trojans and Trusted ICs -- Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering -- MERO: A Statistical Approach for Hardware Trojan Detection -- Theoretical Aspects -- On Tamper-Resistance from a Theoretical Viewpoint -- Mutual Information Analysis: How, When and Why? -- Fault Analysis -- Fault Attacks on RSA Signatures with Partially Unknown Messages -- Differential Fault Analysis on DES Middle Rounds. 330 $aThis book constitutes the refereed proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2009, held in Lausanne, Switzerland during September 6-9, 2009. The book contains 3 invited talks and 29 revised full papers which were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on software implementations, side channel analysis of secret key cryptosystems, side channel analysis of public key cryptosystems, side channel and fault analysis countermeasures, pairing-based cryptography, new ciphers and efficient implementations, TRNGs and device identification, hardware trojans and trusted ICs, theoretical aspects, and fault analysis. 410 0$aSecurity and Cryptology ;$v5747 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aData structures (Computer science) 606 $aComputer security 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSymbolic and Algebraic Manipulation$3https://scigraph.springernature.com/ontologies/product-market-codes/I17052 608 $aKongress.$2swd 608 $aLausanne (2009)$2swd 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData structures (Computer science). 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aData Structures and Information Theory. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSymbolic and Algebraic Manipulation. 676 $a005.8/2 686 $aDAT 130f$2stub 686 $aDAT 260f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aClavier$b Christophe$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGaj$b Kris$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465530903316 996 $aCryptographic Hardware and Embedded Systems - CHES 2009$9773716 997 $aUNISA