000 04310nam a22005535i 4500
001 978-3-540-48059-4
003 DE-He213
005 20160624102029.0
007 cr nn 008mamaa
008 121227s1999 gw | s |||| 0|eng d
020 _a9783540480594
_9978-3-540-48059-4
024 7 _a10.1007/3-540-48059-5
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
245 1 0 _aCryptographic Hardware and Embedded Systems
_h[electronic resource] :
_bFirst InternationalWorkshop, CHES’99 Worcester, MA, USA, August 12–13, 1999 Proceedings /
_cedited by Çetin K. Koç, Christof Paar.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1999.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1999.
300 _aXI, 356 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1717
505 0 _aInvited Talk -- We Need Assurance -- Cryptanalytic Hardware -- Factoring Large Numbers with the TWINKLE Device -- DES Cracking on the Transmogrifier 2a -- Hardware Architectures -- Modelling the Crypto-Processor from Design to Synthesis -- A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond -- Hardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTON -- Smartcards and Embedded Systems -- Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201 -- How to Implement Cost-Effective and Secure Public Key Cryptosystems -- Invited Talk -- Montgomery’s Multiplication Technique: How to Make It Smaller and Faster -- Arithmetic Algorithms I -- A Scalable Architecture for Montgomery Nultiplication -- Arithmetic Design for Permutation Groups -- Fast Multiplication in Finite Fields GF(2n) -- Efficient Finite Field Basis Conversion Involving dual bases -- Power Attacks I -- Power Analysis Attacks of Modular Exponentiation in Smartcards -- DES and Differential Power Analysis The “Duplication” Method -- IPA: A New Class of Power Attacks -- Invited Talk -- Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems -- True Random Number Generators -- A Design of Reliable True Random Number Generator for Cryptographic Applications -- Random Number Generators Founded on Signal and Information Theory -- Cryptographic Algorithms on FPGAs -- A High-Performance Flexible Architecture for Cryptography -- CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor -- Elliptic Curve Scalar Multiplier Design Using FPGAs -- Arithmetic Algorithms II -- Highly Regular Architectures for Finite Field Computation Using Redundant Basis -- Low Complexity Bit-Parallel Finite Field Arithmetic Using Polynomial Basis -- Power Attacks II -- Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems -- Probing Attacks On Tamper-Resistant Devices -- Elliptic Curve Implementations -- Fast Multiplication on Elliptic Curves Over GF(2m) without precomputation -- New Cryptographic Schemes and Modes of Operation -- NICE - New Ideal Coset Encryption - -- Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aSoftware engineering.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aComputational complexity.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSpecial Purpose and Application-Based Systems.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aDiscrete Mathematics in Computer Science.
700 1 _aKoç, Çetin K.
_eeditor.
700 1 _aPaar, Christof.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540666462
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1717
856 4 0 _uhttp://dx.doi.org/10.1007/3-540-48059-5
942 _2EBK6298
_cEBK
999 _c35592
_d35592