Cryptographic Hardware and Embedded Systems - CHES 2004

6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings

  • Marc Joye
  • Jean-Jacques Quisquater
Conference proceedings CHES 2004

DOI: 10.1007/b99451

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3156)

Table of contents (32 papers)

  1. Front Matter
  2. Side Channels I

    1. Towards Efficient Second-Order Power Analysis
      Jason Waddle, David Wagner
      Pages 1-15
    2. Correlation Power Analysis with a Leakage Model
      Eric Brier, Christophe Clavier, Francis Olivier
      Pages 16-29
    3. Power Analysis of an FPGA
      François-Xavier Standaert, Sıddıka Berna Örs, Bart Preneel
      Pages 30-44
  3. Modular Multiplication

    1. Leak Resistant Arithmetic
      Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia
      Pages 62-75
  4. Low Resources I

    1. Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
      E. Öztürk, B. Sunar, E. Savaş
      Pages 92-106
    2. A Low-Cost ECC Coprocessor for Smartcards
      Harald Aigner, Holger Bock, Markus Hütter, Johannes Wolkerstorfer
      Pages 107-118
    3. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
      Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz
      Pages 119-132
  5. Implementation Aspects

  6. Collision Attacks

    1. A Collision-Attack on AES
      Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar
      Pages 163-175
    2. Enhancing Collision Attacks
      Hervé Ledig, Frédéric Muller, Frédéric Valette
      Pages 176-190
  7. Side Channels II

  8. Fault Attacks

    1. Fault Analysis of Stream Ciphers
      Jonathan J. Hoch, Adi Shamir
      Pages 240-253

About these proceedings


AES DES Elliptic Curve Cryptography RSA Radio-Frequency Identification (RFID) Smart Card cryptanalysis cryptograghic hardware cryptography cyber implementation dsp embedded cryptographic systems low power devices security smart cards

Editors and affiliations

  • Marc Joye
    • 1
  • Jean-Jacques Quisquater
    • 2
  1. 1.Thomson R&D France, Technology GroupCorporate Research, Security LaboratoryCesson-Sévigné CedexFrance
  2. 2.UCL Crypto Group 

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-22666-6
  • Online ISBN 978-3-540-28632-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349