Cryptographic Hardware and Embedded Systems – CHES 2008

10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

Editors:

ISBN: 978-3-540-85052-6 (Print) 978-3-540-85053-3 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Side-Channel Analysis 1

    1. Book Chapter

      Pages 1-14

      Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform

    2. Book Chapter

      Pages 15-29

      Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs

    3. Book Chapter

      Pages 30-44

      Multiple-Differential Side-Channel Collision Attacks on AES

  3. Implementations 1

    1. Book Chapter

      Pages 45-61

      Time-Area Optimized Public-Key Engines: \(\mathcal{MQ}\) -Cryptosystems as Replacement for Elliptic Curves?

    2. Book Chapter

      Pages 62-78

      Ultra High Performance ECC over NIST Primes on Commercial FPGAs

    3. Book Chapter

      Pages 79-99

      Exploiting the Power of GPUs for Asymmetric Cryptography

  4. Fault Analysis 1

    1. Book Chapter

      Pages 100-112

      High-Performance Concurrent Error Detection Scheme for AES Hardware

    2. Book Chapter

      Pages 113-129

      A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis

    3. Book Chapter

      Pages 130-145

      RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks

  5. Random Number Generation

    1. Book Chapter

      Pages 146-163

      A Design for a Physical RNG with Robust Entropy Estimators

    2. Book Chapter

      Pages 164-180

      Fast Digital TRNG Based on Metastable Ring Oscillator

    3. Book Chapter

      Pages 181-197

      Efficient Helper Data Key Extractor on FPGAs

  6. Side-Channel Analysis 2

    1. Book Chapter

      Pages 198-213

      The Carry Leakage on the Randomized Exponent Countermeasure

    2. Book Chapter

      Pages 214-227

      Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths

    3. Book Chapter

      Pages 228-243

      Attacking State-of-the-Art Software Countermeasures—A Case Study for AES

  7. Cryptography and Cryptanalysis

    1. Book Chapter

      Pages 244-265

      Binary Edwards Curves

    2. Book Chapter

      Pages 266-282

      A Real-World Attack Breaking A5/1 within Hours

    3. Book Chapter

      Pages 283-299

      Hash Functions and RFID Tags: Mind the Gap

  8. Implementations 2

    1. Book Chapter

      Pages 300-314

      A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases

    2. Book Chapter

      Pages 315-330

      A Very Compact Hardware Implementation of the MISTY1 Block Cipher

previous Page of 2