![cover of the book Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings](/covers/files_200/965000/6ef4796a5d3c64b547b8e4659ec370ee-d.jpg)
Ebook: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings
- Tags: Data Encryption, Computer Communication Networks, Special Purpose and Application-Based Systems, Logic Design, Operating Systems, Management of Computing and Information Systems
- Series: Lecture Notes in Computer Science 3156
- Year: 2004
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the 6th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, held in Cambridge, MA, USA in August 2004.
The 32 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on side channels, modular multiplication, low resources, implementation aspects, collision attacks, fault attacks, hardware implementation, and authentication and signatures.
This book constitutes the refereed proceedings of the 6th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, held in Cambridge, MA, USA in August 2004.
The 32 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on side channels, modular multiplication, low resources, implementation aspects, collision attacks, fault attacks, hardware implementation, and authentication and signatures.
Content:
Front Matter....Pages -
Towards Efficient Second-Order Power Analysis....Pages 1-15
Correlation Power Analysis with a Leakage Model....Pages 16-29
Power Analysis of an FPGA....Pages 30-44
Long Modular Multiplication for Cryptographic Applications....Pages 45-61
Leak Resistant Arithmetic....Pages 62-75
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic....Pages 76-91
A Low-Cost ECC Coprocessor for Smartcards....Pages 92-106
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs....Pages 107-118
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations....Pages 119-132
A Collision-Attack on AES....Pages 133-147
Enhancing Collision Attacks....Pages 148-162
Simple Power Analysis of Unified Code for ECC Double and Add....Pages 163-175
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction....Pages 176-190
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve....Pages 191-204
Switching Blindings with a View Towards IDEA....Pages 205-219
Fault Analysis of Stream Ciphers....Pages 220-229
A Differential Fault Attack Against Early Rounds of (Triple-)DES....Pages 230-239
An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications....Pages 240-253
Improving the Security of Dual-Rail Circuits....Pages 254-267
A New Attack with Side Channel Leakage During Exponent Recoding Computations....Pages 268-281
Defeating Countermeasures Based on Randomized BSD Representations....Pages 282-297
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems....Pages 298-311
Efficient Countermeasures against RPA, DPA, and SPA....Pages 312-327
Strong Authentication for RFID Systems Using the AES Algorithm....Pages 328-342
TTS: High-Speed Signatures on a Low-Cost Smart Card....Pages 343-356
XTR Implementation on Reconfigurable Hardware....Pages 357-370
Concurrent Error Detection Schemes for Involution Ciphers....Pages 371-385
Public Key Authentication with One (Online) Single Addition....Pages 386-399
Attacking DSA Under a Repeated Bits Assumption....Pages 400-412
How to Disembed a Program?....Pages 413-427
Back Matter....Pages 428-440
....Pages 441-454