000 05132nam a22006735i 4500
001 978-3-540-85053-3
003 DE-He213
005 20240730194124.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 _a9783540850533
_9978-3-540-85053-3
024 7 _a10.1007/978-3-540-85053-3
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aCryptographic Hardware and Embedded Systems - CHES 2008
_h[electronic resource] :
_b10th International Workshop, Washington, D.C., USA, August 10-13, 2008, Proceedings /
_cedited by Elisabeth Oswald, Pankaj Rohatgi.
250 _a1st ed. 2008.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2008.
300 _aXIII, 445 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5154
505 0 _aSide-Channel Analysis 1 -- Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform -- Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs -- Multiple-Differential Side-Channel Collision Attacks on AES -- Implementations 1 -- Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves? -- Ultra High Performance ECC over NIST Primes on Commercial FPGAs -- Exploiting the Power of GPUs for Asymmetric Cryptography -- Fault Analysis 1 -- High-Performance Concurrent Error Detection Scheme for AES Hardware -- A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis -- RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks -- Random Number Generation -- A Design for a Physical RNG with Robust Entropy Estimators -- Fast Digital TRNG Based on Metastable Ring Oscillator -- Efficient Helper Data Key Extractor on FPGAs -- Side-Channel Analysis 2 -- The Carry Leakage on the Randomized Exponent Countermeasure -- Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths -- Attacking State-of-the-Art Software Countermeasures-A Case Study for AES -- Cryptography and Cryptanalysis -- Binary Edwards Curves -- A Real-World Attack Breaking A5/1 within Hours -- Hash Functions and RFID Tags: Mind the Gap -- Implementations 2 -- A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases -- A Very Compact Hardware Implementation of the MISTY1 Block Cipher -- Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography -- Fault Analysis 2 -- Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration -- RFID and Its Vulnerability to Faults -- Perturbating RSA Public Keys: An Improved Attack -- Side-Channel Analysis 3 -- DividedBackend Duplication Methodology for Balanced Dual Rail Routing -- Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages -- Mutual Information Analysis -- Invited Talks -- RSA-Past, Present, Future -- A Vision for Platform Security.
520 _aThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.C., USA, during August 10-13, 2008. The book contains 2 invited talks and 27 revised full papers which were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on side channel analysis, implementations, fault analysis, random number generation, and cryptography and cryptanalysis.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aData protection.
_97245
650 0 _aCoding theory.
_94154
650 0 _aInformation theory.
_914256
650 0 _aAlgorithms.
_93390
650 0 _aComputers, Special purpose.
_946653
650 0 _aComputer networks .
_931572
650 1 4 _aCryptology.
_931769
650 2 4 _aData and Information Security.
_931990
650 2 4 _aCoding and Information Theory.
_9155808
650 2 4 _aAlgorithms.
_93390
650 2 4 _aSpecial Purpose and Application-Based Systems.
_946654
650 2 4 _aComputer Communication Networks.
_9155809
700 1 _aOswald, Elisabeth.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9155810
700 1 _aRohatgi, Pankaj.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9155811
710 2 _aSpringerLink (Online service)
_9155812
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540850526
776 0 8 _iPrinted edition:
_z9783540873068
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5154
_9155813
856 4 0 _uhttps://doi.org/10.1007/978-3-540-85053-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c95037
_d95037