000 06307cam a2200877Mi 4500
001 ocn851731780
003 OCoLC
005 20250703162616.0
006 m o d
007 cr mnu---uuaaa
008 121227s1999 gw ob 000 0 eng
040 _aAU@
_beng
_epn
_cAU@
_dOCLCO
_dNLGGC
_dOCLCQ
_dDKDLA
_dUV0
_dGW5XE
_dOCLCQ
_dSHS
_dESU
_dOCLCQ
_dBUF
_dOCLCF
_dLEAUB
_dOCLCQ
_dEBLCP
_dOCLCO
_dOCLCQ
_dJF0
_dINT
_dOCLCO
_dOCLCL
_dSXB
_dOCLCQ
_dOCLCL
019 _a66552906
_a771189509
_a1044496781
_a1243548229
_a1244628680
_a1330574764
_a1374607600
020 _a9783540666462
020 _a354066646X
020 _a9783540480594
020 _a3540480595
020 _a9788354048053
_q(4)
020 _a8354048055
024 7 _a10.1007/3-540-48059-5
_2doi
029 0 _aAU@
_b000051688143
029 1 _aAU@
_b000058012653
029 1 _aAU@
_b000058158329
029 1 _aNLGGC
_b267147783
029 1 _aNZ1
_b14996096
029 1 _aNZ1
_b15301585
035 _a(OCoLC)851731780
_z(OCoLC)66552906
_z(OCoLC)771189509
_z(OCoLC)1044496781
_z(OCoLC)1243548229
_z(OCoLC)1244628680
_z(OCoLC)1330574764
_z(OCoLC)1374607600
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.82
_223
_1https://id.oclc.org/worldcat/ddc/E3bhgdQVHCHcvytkYTgqrWyjjt
084 _a54.29
_2bcl
084 _a54.62
_2bcl
049 _aMAIN
100 1 _aKoç, Çetin K.
_943267
245 1 0 _aCryptographic Hardware and Embedded Systems :
_bFirst InternationalWorkshop, CHES'99 Worcester, MA, USA, August 12-13, 1999 Proceedings /
_cedited by Çetin K. Koç, Christof Paar.
260 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1999.
300 _a1 online resource (xi, 353 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1717
520 _aThis book constitutes the refereed proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, CHES'99, held in Worcester, MA, USA in August 1999. The 27 revised papers presented together with three invited contributions were carefully reviewed and selected from 42 submissions. The papers are organized in sections on cryptographic hardware, hardware architectures, smartcards and embedded systems, arithmetic algorithms, power attacks, true random numbers, cryptographic algorithms on FPGAs, elliptic curve implementations, new cryptographic schemes and modes of operation.
504 _aWith bibliogr. references.
505 0 _aInvited Talk -- We Need Assurance -- Cryptanalytic Hardware -- Factoring Large Numbers with the TWINKLE Device -- DES Cracking on the Transmogrifier 2a -- Hardware Architectures -- Modelling the Crypto-Processor from Design to Synthesis -- A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond -- Hardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTON -- Smartcards and Embedded Systems -- Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201 -- How to Implement Cost-Effective and Secure Public Key Cryptosystems -- Invited Talk -- Montgomery's Multiplication Technique: How to Make It Smaller and Faster -- Arithmetic Algorithms I -- A Scalable Architecture for Montgomery Nultiplication -- Arithmetic Design for Permutation Groups -- Fast Multiplication in Finite Fields GF(2n) -- Efficient Finite Field Basis Conversion Involving dual bases -- Power Attacks I -- Power Analysis Attacks of Modular Exponentiation in Smartcards -- DES and Differential Power Analysis The "Duplication" Method -- IPA: A New Class of Power Attacks -- Invited Talk -- Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems -- True Random Number Generators -- A Design of Reliable True Random Number Generator for Cryptographic Applications -- Random Number Generators Founded on Signal and Information Theory -- Cryptographic Algorithms on FPGAs -- A High-Performance Flexible Architecture for Cryptography -- CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor -- Elliptic Curve Scalar Multiplier Design Using FPGAs -- Arithmetic Algorithms II -- Highly Regular Architectures for Finite Field Computation Using Redundant Basis -- Low Complexity Bit-Parallel Finite Field Arithmetic Using Polynomial Basis -- Power Attacks II -- Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems -- Probing Attacks On Tamper-Resistant Devices -- Elliptic Curve Implementations -- Fast Multiplication on Elliptic Curves Over GF(2m) without precomputation -- New Cryptographic Schemes and Modes of Operation -- NICE -- New Ideal Coset Encryption -- Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks.
650 0 _aComputer science.
_9941
650 0 _aComputer Communication Networks.
650 0 _aSoftware engineering.
_914736
650 0 _aData encryption (Computer science)
_913647
650 0 _aComputer software.
_915271
650 0 _aComputational complexity.
_9391
650 2 _aElectronic Data Processing
_96665
650 2 _aSoftware
_916724
650 6 _aInformatique.
_914930
650 6 _aGénie logiciel.
_919335
650 6 _aChiffrement (Informatique)
_913649
650 6 _aLogiciels.
_926065
650 6 _aComplexité de calcul (Informatique)
650 7 _asoftware.
_2aat
_916724
650 7 _aComputational complexity
_2fast
_9391
650 7 _aComputer science
_2fast
_9941
650 7 _aComputer software
_2fast
_915271
650 7 _aData encryption (Computer science)
_2fast
_913647
650 7 _aSoftware engineering
_2fast
_914736
700 1 _aPaar, Christof.
_943268
758 _ihas work:
_aCryptographic hardware and embedded systems (Text)
_1https://id.oclc.org/worldcat/entity/E39PCH7KWBf6bxR7XKVHxHxfYP
_4https://id.oclc.org/worldcat/ontology/hasWork
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition
_z9783540666462
830 0 _aLecture notes in computer science ;
_v1717.
856 4 0 _uhttps://link.springer.com/10.1007/3-540-48059-5
938 _aProQuest Ebook Central
_bEBLB
_nEBL6485918
994 _a92
_bATIST
999 _c642784
_d642784