Book Volume 3156 2004

Cryptographic Hardware and Embedded Systems - CHES 2004

6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings


ISBN: 978-3-540-22666-6 (Print) 978-3-540-28632-5 (Online)

Table of contents (32 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Side Channels I

    1. Chapter

      Pages 1-15

      Towards Efficient Second-Order Power Analysis

    2. Chapter

      Pages 16-29

      Correlation Power Analysis with a Leakage Model

    3. Chapter

      Pages 30-44

      Power Analysis of an FPGA

  3. Modular Multiplication

    1. Chapter

      Pages 45-61

      Long Modular Multiplication for Cryptographic Applications

    2. Chapter

      Pages 62-75

      Leak Resistant Arithmetic

    3. Chapter

      Pages 76-91

      Efficient Linear Array for Multiplication in GF(2 m ) Using a Normal Basis for Elliptic Curve Cryptography

  4. Low Resources I

    1. Chapter

      Pages 92-106

      Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic

    2. Chapter

      Pages 107-118

      A Low-Cost ECC Coprocessor for Smartcards

    3. Chapter

      Pages 119-132

      Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs

  5. Implementation Aspects

    1. Chapter

      Pages 133-147

      Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m )

    2. Chapter

      Pages 148-162

      Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations

  6. Collision Attacks

    1. Chapter

      Pages 163-175

      A Collision-Attack on AES

    2. Chapter

      Pages 176-190

      Enhancing Collision Attacks

  7. Side Channels II

    1. Chapter

      Pages 191-204

      Simple Power Analysis of Unified Code for ECC Double and Add

    2. Chapter

      Pages 205-219

      DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction

    3. Chapter

      Pages 220-229

      Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve

    4. Chapter

      Pages 230-239

      Switching Blindings with a View Towards IDEA

  8. Fault Attacks

    1. Chapter

      Pages 240-253

      Fault Analysis of Stream Ciphers

    2. Chapter

      Pages 254-267

      A Differential Fault Attack Against Early Rounds of (Triple-)DES

  9. Hardware Implementation I

    1. Chapter

      Pages 268-281

      An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications

previous Page of 2