Cryptographic Hardware and Embedded Systems – CHES 2005

7th International Workshop, Edinburgh, UK, August 29 – September 1, 2005. Proceedings

  • Josyula R. Rao
  • Berk Sunar
Conference proceedings CHES 2005
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3659)

Table of contents

  1. Front Matter
  2. Side Channels I

    1. William Dupuy, Sébastien Kunz-Jacques
      Pages 1-14
    2. Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm
      Pages 15-29
    3. Werner Schindler, Kerstin Lemke, Christof Paar
      Pages 30-46
  3. Arithmetic for Cryptanalysis

    1. Jean Sébastien Coron, David Lefranc, Guillaume Poupard
      Pages 47-60
    2. P. J. Green, R. Noad, N. P. Smart
      Pages 61-74
  4. Low Resources

    1. Johann Großschädl, Roberto M. Avanzi, Erkay Savaş, Stefan Tillich
      Pages 75-90
    2. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
      Pages 91-105
    3. Lejla Batina, David Hwang, Alireza Hodjat, Bart Preneel, Ingrid Verbauwhede
      Pages 106-118
  5. Special Purpose Hardware

    1. Jens Franke, Thorsten Kleinjung, Christof Paar, Jan Pelzl, Christine Priplata, Colin Stahlke
      Pages 119-130
    2. Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer
      Pages 131-146
    3. Marco Bucci, Raimondo Luzzi
      Pages 147-156
  6. Hardware Attacks and Countermeasures I

    1. Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald
      Pages 157-171
    2. Wieland Fischer, Berndt M. Gammel
      Pages 187-200
  7. Arithmetic for Cryptography

  8. Side Channel II (EM)

    1. Catherine H. Gebotys, Simon Ho, C. C. Tiu
      Pages 250-264

About these proceedings

Keywords

AES DES Elliptic Curve Cryptography Error-correcting Code Hardware Routing Trusted Computing cryptanalysis cryptographic hardware embedded cryptographic systems finite field arithmetic hardware implementation low power devices security side-channel attacks

Editors and affiliations

  • Josyula R. Rao
    • 1
  • Berk Sunar
    • 2
  1. 1.IBM Watson Research CenterYorktown HeightsUSA
  2. 2.Cryptography & Information Security LaboratoryWPIWorcesterUSA

Bibliographic information

  • DOI https://doi.org/10.1007/11545262
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-28474-1
  • Online ISBN 978-3-540-31940-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349