注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當前位置: 首頁出版圖書科學技術計算機/網(wǎng)絡計算機組織與體系結(jié)構加密硬件與嵌入式系統(tǒng)CHES 2001

加密硬件與嵌入式系統(tǒng)CHES 2001

加密硬件與嵌入式系統(tǒng)CHES 2001

定 價:¥722.64

作 者: Cetin K. Koc 著
出版社: 湖南文藝出版社
叢編項:
標 簽: 暫缺

購買這本書可以去


ISBN: 9783540425212 出版時間: 2001-12-01 包裝: 平裝
開本: 頁數(shù): 字數(shù):  

內(nèi)容簡介

  This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Cryptoanalysis Hardware and Embedded Systems, CHES 2001, held in Paris, France in Mai 2001. The 31 revised full papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections on side channel attacks, Rijndael hardware implementation, random number generators, elliptic curve algorithms, arithmetic architectures, cryptanalysis, embedded implementations of ciphers, and side channel attacks on elliptic curve cryptosystems.

作者簡介

暫缺《加密硬件與嵌入式系統(tǒng)CHES 2001》作者簡介

圖書目錄

Invited Talk
 Protecting Embedded Systems - The Next Ten Years
Side Channel Attacks I
A Sound Method for Switching between Boolean and Arithmetic Masking
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware
Random Register Renaming to Foil DPA
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
Rijndael Hardware Implementations
Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm
High Performance Single-Chip FPGA Rijndael Algorithm
Two Methods of Rijndael Implementation in Reconfigurable Hardware
Random Number Generators
Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor
Efficient Online Tests for True Random Number Generators
Elliptic Curve Algorithms
The Hessian Form of an Elliptic Curve
Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve
Generating Elliptic Curves of Prime Order
Invited Talk
New Directions in Croptography
Arithmetic Architectures
A New Low Complexity Parallel Multiplier for a Class of Finite Fields .
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic
High-Radix Design of a Scalable Modular Multiplier
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)
Cryptanalysis
Attacks on Cryptoprocessor Transaction Sets
Bandwidth-Optimal Kleptographic Attacks
Electromagnetic Analysis: Concrete Results
Embedded Implementations and New Ciphers
Hardware Implementations of Ciphers
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號