Cryptographic Hardware and Embedded Systems - CHES 2002

4th International Workshop Redwood Shores, CA, USA, August 13–15, 2002 Revised Papers

Editors:

ISBN: 978-3-540-00409-7 (Print) 978-3-540-36400-9 (Online)

Table of contents (43 chapters)

previous Page of 3
  1. Front Matter

    Pages I-XIV

  2. Invited Talk

    1. Book Chapter

      Pages 1-1

      CHES: Past, Present, and Future

  3. Attack Strategies

    1. Book Chapter

      Pages 2-12

      Optical Fault Induction Attacks

    2. Book Chapter

      Pages 13-28

      Template Attacks

    3. Book Chapter

      Pages 29-45

      The EM Side—Channel(s)

  4. Finite Field and Modular Arithmetic I

    1. Book Chapter

      Pages 46-56

      Enhanced Montgomery Multiplication

    2. Book Chapter

      Pages 57-70

      New Algorithm for Classical Modular Inverse

    3. Book Chapter

      Pages 71-81

      Increasing the Bitlength of a Crypto-Coprocessor

  5. Elliptic Curve Cryptography I

    1. Book Chapter

      Pages 82-97

      Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems

    2. Book Chapter

      Pages 98-113

      Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks

    3. Book Chapter

      Pages 114-128

      Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor

    4. Book Chapter

      Pages 129-143

      Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA

  6. AES and AES Candidates

    1. Book Chapter

      Pages 144-158

      2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis

    2. Book Chapter

      Pages 159-171

      Efficient Software Implementation of AES on 32-Bit Platforms

    3. Book Chapter

      Pages 172-186

      An Optimized S-Box Circuit Architecture for Low Power AES Design

    4. Book Chapter

      Pages 187-197

      Simplified Adaptive Multiplicative Masking for AES

    5. Book Chapter

      Pages 198-212

      Multiplicative Masking and Power Analysis of AES

  7. Tamper Resistance

    1. Book Chapter

      Pages 213-227

      Keeping Secrets in Hardware: The Microsoft XboxTM Case Study

  8. RSA Implementation

    1. Book Chapter

      Pages 228-243

      A DPA Attack against the Modular Reduction within a CRT Implementation of RSA

    2. Book Chapter

      Pages 244-259

      Further Results and Considerations on Side Channel Attacks on RSA

    3. Book Chapter

      Pages 260-275

      Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures

previous Page of 3