加密硬件与嵌入系统 - CHES 2006/会议录 Cryptographic hardware and embedded systems:CHES 2006

加密硬件与嵌入系统 - CHES 2006/会议录 Cryptographic hardware and embedded systems:CHES 2006
作 者: Louis Goubin 
出版社: 湖南文艺出版社
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《加密硬件与嵌入系统 - CHES 2006/会议录 Cryptographic hardware and embedded systems:CHES 2006》作者简介

内容简介

This book constitutes the refereed proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006, held in Yokohama, Japan in October 2006.The 32 revised full papers presented together with 3 invited talks were carefullyreviewed and selected from 112 submissions. The papers are organized in topical sections on side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, side channels, hardware attacks and countermeasures, efficient hardware, trusted computing, side channels, hardware attacks and countermeasures, as well as efficient hardware.

图书目录

Side Channels I

Template Attacks in Principal Subspaces

Templates vs. Stochastic Methods

Towards Security Limits in Side-Channel Attacks

Low Resources

HIGHT: A New Block Cipher Suitable for Low-Resource Device

Invited Talk I

Integer Factoring Utilizing PC Cluster

Hardware Attacks and Countermeasures I

Optically Enhanced Position-Locked Power Analysis

Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations

A Generalized Method of Differential Fault Attack Against AES Cryptosystem

Special Purpose Hardware

Breaking Ciphers with COPACOBANA A Cost-Optimized Parallel Code Breaker.

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware

Efficient Algorithms for Embedded Processors

Implementing Cryptographic Pairings on Smartcards SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form

Fast Generation of Prime Numbers on Portable Devices: An Update...

Side Channels II

A Proposition for Correlation Power Analysis Enhancement

High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching

Cache-Collision Timing Attacks Auainst AES

Provably Secure S-Box Implementation Based on Fourier Transform ...

Invited Talk II

The Outer Limits of RFID Security

Hardware Attacks and Countermeasures

Efficient Hardware

Trusted Commputing

Side Channels

Hardware Attacks and Countermeasures

Invited Talk

Efficient Hardware

Author Index