Cryptographic Hardware and Embedded Systems

First InternationalWorkshop, CHES’99 Worcester, MA, USA, August 12–13, 1999 Proceedings


ISBN: 978-3-540-66646-2 (Print) 978-3-540-48059-4 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Invited Talk

    1. Book Chapter

      Pages 1-1

      We Need Assurance

  2. Cryptanalytic Hardware

    1. Book Chapter

      Pages 2-12

      Factoring Large Numbers with the TWINKLE Device

    2. Book Chapter

      Pages 13-24

      DES Cracking on the Transmogrifier 2a

  3. Hardware Architectures

    1. Book Chapter

      Pages 25-36

      Modelling the Crypto-Processor from Design to Synthesis

    2. Book Chapter

      Pages 37-48

      A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond

    3. Book Chapter

      Pages 49-60

      Hardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTON

  4. Smartcards and Embedded Systems

    1. Book Chapter

      Pages 61-72

      Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201

    2. Book Chapter

      Pages 73-79

      How to Implement Cost-Effective and Secure Public Key Cryptosystems

  5. Invited Talk

    1. Book Chapter

      Pages 80-93

      Montgomery’s Multiplication Technique: How to Make It Smaller and Faster

  6. Arithmetic Algorithms I

    1. Book Chapter

      Pages 94-108

      A Scalable Architecture for Montgomery Nultiplication

    2. Book Chapter

      Pages 109-121

      Arithmetic Design for Permutation Groups

    3. Book Chapter

      Pages 122-134

      Fast Multiplication in Finite Fields GF(2 n )

    4. Book Chapter

      Pages 135-143

      Efficient Finite Field Basis Conversion Involving dual bases

  7. Power Attacks I

    1. Book Chapter

      Pages 144-157

      Power Analysis Attacks of Modular Exponentiation in Smartcards

    2. Book Chapter

      Pages 158-172

      DES and Differential Power Analysis The “Duplication” Method

    3. Book Chapter

      Pages 173-186

      IPA: A New Class of Power Attacks

  8. Invited Talk

    1. Book Chapter

      Pages 187-203

      Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems

  9. True Random Number Generators

    1. Book Chapter

      Pages 204-218

      A Design of Reliable True Random Number Generator for Cryptographic Applications

    2. Book Chapter

      Pages 219-230

      Random Number Generators Founded on Signal and Information Theory

  10. Cryptographic Algorithms on FPGAs

    1. Book Chapter

      Pages 231-245

      A High-Performance Flexible Architecture for Cryptography

previous Page of 2