Cryptographic Hardware and Embedded Systems (Record no. 35592)

000 -LEADER
fixed length control field 04310nam a22005535i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783540480594
-- 978-3-540-48059-4
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
245 10 - TITLE STATEMENT
Title Cryptographic Hardware and Embedded Systems
Sub Title First InternationalWorkshop, CHES’99 Worcester, MA, USA, August 12–13, 1999 Proceedings /
Statement of responsibility, etc edited by Çetin K. Koç, Christof Paar.
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Berlin, Heidelberg :
Name of publisher Springer Berlin Heidelberg,
Year of publication 1999.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XI, 356 p.
Other physical details online resource.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Invited Talk -- We Need Assurance -- Cryptanalytic Hardware -- Factoring Large Numbers with the TWINKLE Device -- DES Cracking on the Transmogrifier 2a -- Hardware Architectures -- Modelling the Crypto-Processor from Design to Synthesis -- A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond -- Hardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTON -- Smartcards and Embedded Systems -- Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201 -- How to Implement Cost-Effective and Secure Public Key Cryptosystems -- Invited Talk -- Montgomery’s Multiplication Technique: How to Make It Smaller and Faster -- Arithmetic Algorithms I -- A Scalable Architecture for Montgomery Nultiplication -- Arithmetic Design for Permutation Groups -- Fast Multiplication in Finite Fields GF(2n) -- Efficient Finite Field Basis Conversion Involving dual bases -- Power Attacks I -- Power Analysis Attacks of Modular Exponentiation in Smartcards -- DES and Differential Power Analysis The “Duplication” Method -- IPA: A New Class of Power Attacks -- Invited Talk -- Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems -- True Random Number Generators -- A Design of Reliable True Random Number Generator for Cryptographic Applications -- Random Number Generators Founded on Signal and Information Theory -- Cryptographic Algorithms on FPGAs -- A High-Performance Flexible Architecture for Cryptography -- CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor -- Elliptic Curve Scalar Multiplier Design Using FPGAs -- Arithmetic Algorithms II -- Highly Regular Architectures for Finite Field Computation Using Redundant Basis -- Low Complexity Bit-Parallel Finite Field Arithmetic Using Polynomial Basis -- Power Attacks II -- Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems -- Probing Attacks On Tamper-Resistant Devices -- Elliptic Curve Implementations -- Fast Multiplication on Elliptic Curves Over GF(2m) without precomputation -- New Cryptographic Schemes and Modes of Operation -- NICE - New Ideal Coset Encryption - -- Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Communication Networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Software engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computational complexity.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Special Purpose and Application-Based Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Algorithm Analysis and Problem Complexity.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Discrete Mathematics in Computer Science.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Koç, Çetin K.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Paar, Christof.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/3-540-48059-5
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-BOOKS
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 1999.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
Holdings
Withdrawn status Lost status Damaged status Not for loan Current library Accession Number Uniform Resource Identifier Koha item type
        IMSc Library EBK6298 http://dx.doi.org/10.1007/3-540-48059-5 E-BOOKS
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha