LEADER 06008nam 22007695 450 001 996466472803316 005 20200701044523.0 010 $a3-540-45238-9 024 7 $a10.1007/978-3-540-45238-6 035 $a(CKB)3400000000102307 035 $a(SSID)ssj0000322395 035 $a(PQKBManifestationID)11243189 035 $a(PQKBTitleCode)TC0000322395 035 $a(PQKBWorkID)10286731 035 $a(PQKB)10849732 035 $a(DE-He213)978-3-540-45238-6 035 $a(MiAaPQ)EBC3088119 035 $a(PPN)155168487 035 $a(EXLCZ)993400000000102307 100 $a20121227d2003 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptographic Hardware and Embedded Systems -- CHES 2003$b[electronic resource] $e5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings /$fedited by Colin D. Walter, Cetin K. Koc, Christof Paar 205 $a1st ed. 2003. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2003. 215 $a1 online resource (XIV, 446 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2779 300 $aIncludes index. 311 $a3-540-40833-9 327 $aInvited Talk -- The Security Challenges of Ubiquitous Computing -- Side Channel Attack Methodology -- Multi-channel Attacks -- Hidden Markov Model Cryptanalysis -- Power-Analysis Attacks on an FPGA ? First Experimental Results -- Hardware Factorization -- Hardware to Solve Sparse Systems of Linear Equations over GF(2) -- Symmetric Ciphers: Side Channel Attacks and Countermeasures -- Cryptanalysis of DES Implemented on Computers with Cache -- A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad -- A New Algorithm for Switching from Arithmetic to Boolean Masking -- DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits -- Secure Hardware Logic -- Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers -- Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology -- Security Evaluation of Asynchronous Circuits -- Random Number Generators -- Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts -- True Random Number Generators Secure in a Changing Environment -- How to Predict the Output of a Hardware Random Number Generator -- Efficient Multiplication -- On Low Complexity Bit Parallel Polynomial Basis Multipliers -- Efficient Modular Reduction Algorithm in [x] and Its Application to ?Left to Right? Modular Multiplication in [x] -- Faster Double-Size Modular Multiplication from Euclidean Multipliers -- More on Efficient Arithmetic -- Efficient Exponentiation for a Class of Finite Fields GF(2 n ) Determined by Gauss Periods -- GCD-Free Algorithms for Computing Modular Inverses -- Attacks on Asymmetric Cryptosystems -- Attacking Unbalanced RSA-CRT Using SPA -- The Doubling Attack ? Why Upwards Is Better than Downwards -- An Analysis of Goubin?s Refined Power Analysis Attack -- A New Type of Timing Attack: Application to GPS -- Implementation of Symmetric Ciphers -- Unified Hardware Architecture for 128-Bit Block Ciphers AES and Camellia -- Very Compact FPGA Implementation of the AES Algorithm -- Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs -- Hyperelliptic Curve Cryptography -- Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves -- Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems -- Countermeasures to Side Channel Leakage -- A Practical Countermeasure against Address-Bit Differential Power Analysis -- A More Flexible Countermeasure against Side Channel Attacks Using Window Method -- Security of Standards -- On the Security of PKCS #11 -- Attacking RSA-Based Sessions in SSL/TLS. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2779 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aLogic design 606 $aSpecial purpose computers 606 $aOperating systems (Computers) 606 $aComputer science?Mathematics 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aLogic Design$3https://scigraph.springernature.com/ontologies/product-market-codes/I12050 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aLogic design. 615 0$aSpecial purpose computers. 615 0$aOperating systems (Computers). 615 0$aComputer science?Mathematics. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aLogic Design. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aOperating Systems. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 702 $aWalter$b Colin D$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKoc$b Cetin K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPaar$b Christof$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aCHES 2003 906 $aBOOK 912 $a996466472803316 996 $aCryptographic Hardware and Embedded Systems -- CHES 2003$92088750 997 $aUNISA