Advertisement

Cryptographic Hardware and Embedded Systems – CHES 2005

7th International Workshop, Edinburgh, UK, August 29 – September 1, 2005. Proceedings

  • Josyula R. Rao
  • Berk Sunar
Conference proceedings CHES 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3659)

Table of contents

  1. Front Matter
  2. Side Channels I

    1. William Dupuy, Sébastien Kunz-Jacques
      Pages 1-14
    2. Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm
      Pages 15-29
    3. Werner Schindler, Kerstin Lemke, Christof Paar
      Pages 30-46
  3. Arithmetic for Cryptanalysis

    1. Jean Sébastien Coron, David Lefranc, Guillaume Poupard
      Pages 47-60
    2. P. J. Green, R. Noad, N. P. Smart
      Pages 61-74
  4. Low Resources

    1. Johann Großschädl, Roberto M. Avanzi, Erkay Savaş, Stefan Tillich
      Pages 75-90
    2. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
      Pages 91-105
    3. Lejla Batina, David Hwang, Alireza Hodjat, Bart Preneel, Ingrid Verbauwhede
      Pages 106-118
  5. Special Purpose Hardware

    1. Jens Franke, Thorsten Kleinjung, Christof Paar, Jan Pelzl, Christine Priplata, Colin Stahlke
      Pages 119-130
    2. Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer
      Pages 131-146
    3. Marco Bucci, Raimondo Luzzi
      Pages 147-156
  6. Hardware Attacks and Countermeasures I

    1. Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald
      Pages 157-171
    2. Wieland Fischer, Berndt M. Gammel
      Pages 187-200
  7. Arithmetic for Cryptography

  8. Side Channel II (EM)

    1. Catherine H. Gebotys, Simon Ho, C. C. Tiu
      Pages 250-264
    2. Markus G. Kuhn
      Pages 265-279
    3. Huiyun Li, A. Theodore Markettos, Simon Moore
      Pages 280-292
  9. Side Channel III

    1. Marc Joye, Pascal Paillier, Berry Schoenmakers
      Pages 293-308
    2. Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater
      Pages 309-323
  10. Trusted Computing

    1. Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble
      Pages 324-338
  11. Hardware Attacks and Countermeasures II

    1. Sergei Skorobogatov
      Pages 339-353
    2. Kris Tiri, David Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont et al.
      Pages 354-365
  12. Hardware Attacks and Countermeasures III

    1. Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
      Pages 366-382
    2. Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet
      Pages 383-397
  13. Efficient Hardware I

    1. T. Kerins, W. P. Marnane, E. M. Popovici, P. S. L. M. Barreto
      Pages 412-426
  14. Efficient Hardware II

    1. Tim Good, Mohammed Benaissa
      Pages 427-440
    2. D. Canright
      Pages 441-455
  15. Back Matter

About these proceedings

Keywords

AES DES Elliptic Curve Cryptography Error-correcting Code Hardware Routing Trusted Computing cryptanalysis cryptographic hardware embedded cryptographic systems finite field arithmetic hardware implementation low power devices security side-channel attacks

Editors and affiliations

  • Josyula R. Rao
    • 1
  • Berk Sunar
    • 2
  1. 1.IBM Watson Research CenterYorktown HeightsUSA
  2. 2.Cryptography & Information Security LaboratoryWPIWorcesterUSA

Bibliographic information

  • DOI https://doi.org/10.1007/11545262
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-28474-1
  • Online ISBN 978-3-540-31940-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site