Texts Books | READER Loading...

Cryptographic hardware and embedded systems : First International Workshop, CHES '99, Worcester, MA, USA, Augu | CHES '99 (1999 : Worcester, Mass.), Koç, Çetin K., 1957-, Paar, Christof, 1963-

Deal Score+2
Telegram icon Share on Telegram

Cryptographic hardware and embedded systems : First International Workshop, CHES '99, Worcester, MA, USA, Augu

User Rating: Be the first one!

Author: CHES '99 (1999 : Worcester, Mass.), Koç, Çetin K., 1957-, Paar, Christof, 1963-

Added by: sketch

Added Date: 2015-12-30

Publication Date: 1999

Language: eng

Subjects: Embedded computer systems, Cryptography, Computer security, nombre aléatoire, courbe elliptique, algorithme arithmétique, architecture matériel, système embarqué, cryptographie, Systèmes enfouis (Informatique) More

Publishers: Berlin ; New York : Springer

Collections: folkscanomy miscellaneous, folkscanomy, additional collections

ISBN Number: 354066646X, 9783540666462

Pages Count: 600

PPI Count: 600

PDF Count: 1

Total Size: 350.48 MB

PDF Size: 13.28 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Edition: Revised.

Archive Url

Downloads: 651

Views: 701

Total Files: 18

Media Type: texts

Description

Cryptographic Hardware and Embedded Systems: First InternationalWorkshop, CHES’99 Worcester, MA, USA, August 12–13, 1999 Proceedings
Author: Çetin K. Koç, Christof Paar
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-66646-2
DOI: 10.1007/3-540-48059-5

Table of Contents:

  • We Need Assurance
  • Factoring Large Numbers with the TWINKLE Device
  • DES Cracking on the Transmogrifier 2a
  • Modelling the Crypto-Processor from Design to Synthesis
  • A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond
  • Hardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTON
  • Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201
  • How to Implement Cost-Effective and Secure Public Key Cryptosystems
  • Montgomery’s Multiplication Technique: How to Make It Smaller and Faster
  • A Scalable Architecture for Montgomery Nultiplication
  • Arithmetic Design for Permutation Groups
  • Fast Multiplication in Finite Fields GF(2n)
  • Efficient Finite Field Basis Conversion Involving dual bases
  • Power Analysis Attacks of Modular Exponentiation in Smartcards
  • DES and Differential Power Analysis The “Duplication” Method
  • IPA: A New Class of Power Attacks
  • Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems
  • A Design of Reliable True Random Number Generator for Cryptographic Applications
  • Random Number Generators Founded on Signal and Information Theory
  • A High-Performance Flexible Architecture for Cryptography

Includes bibliographical references and index
READER
Logo
Compare items
  • Total (0)
Compare
0
Shopping cart