Cryptographic Hardware and Embedded Systems - CHES 2003

5th International Workshop, Cologne, Germany, September 8–10, 2003. Proceedings

  • Colin D. Walter
  • Çetin K. Koç
  • Christof Paar
Conference proceedings CHES 2003

DOI: 10.1007/978-3-540-45238-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2779)

Table of contents (33 papers)

  1. Front Matter
  2. Invited Talk

  3. Side Channel Attack Methodology

    1. Multi-channel Attacks
      Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
      Pages 2-16
    2. Hidden Markov Model Cryptanalysis
      Chris Karlof, David Wagner
      Pages 17-34
    3. Power-Analysis Attacks on an FPGA – First Experimental Results
      Sıddıka Berna Örs, Elisabeth Oswald, Bart Preneel
      Pages 35-50
  4. Hardware Factorization

    1. Hardware to Solve Sparse Systems of Linear Equations over GF(2)
      Willi Geiselmann, Rainer Steinwandt
      Pages 51-61
  5. Symmetric Ciphers: Side Channel Attacks and Countermeasures

    1. Cryptanalysis of DES Implemented on Computers with Cache
      Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi
      Pages 62-76
    2. A New Algorithm for Switching from Arithmetic to Boolean Masking
      Jean-Sébastien Coron, Alexei Tchulkine
      Pages 89-97
  6. Secure Hardware Logic

    1. Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers
      Ramesh Karri, Grigori Kuznetsov, Michael Goessel
      Pages 113-124
    2. Security Evaluation of Asynchronous Circuits
      Jacques J. A. Fournier, Simon Moore, Huiyun Li, Robert Mullins, George Taylor
      Pages 137-151
  7. Random Number Generators

    1. Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts
      Michael Epstein, Laszlo Hars, Raymond Krasinski, Martin Rosner, Hao Zheng
      Pages 152-165
    2. True Random Number Generators Secure in a Changing Environment
      Boaz Barak, Ronen Shaltiel, Eran Tromer
      Pages 166-180
  8. Efficient Multiplication

  9. More on Efficient Arithmetic

About these proceedings


DSP Elliptic Curve Cryptography Hardware Standards cryptanalysis cryptographic hardware cryptography cypher implementation embedded cryptographic systems finite field arithmetic hardware implementation logic security smart cards systems security

Editors and affiliations

  • Colin D. Walter
    • 1
  • Çetin K. Koç
    • 2
  • Christof Paar
    • 3
  1. 1.Comodo Research LabBradfordUK
  2. 2.Information Security Research CenterIstanbul Commerce UniversityEminönü, IstanbulTurkey
  3. 3.Horst Görtz Institute for IT SecurityRuhr University BochumBochumGermany

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-40833-8
  • Online ISBN 978-3-540-45238-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349