Advertisement

© 2005

Cryptographic Hardware and Embedded Systems – CHES 2005

7th International Workshop, Edinburgh, UK, August 29 – September 1, 2005. Proceedings

  • Josyula R. Rao
  • Berk Sunar
Conference proceedings CHES 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3659)

Table of contents

  1. Front Matter
  2. Side Channels I

    1. William Dupuy, Sébastien Kunz-Jacques
      Pages 1-14
    2. Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm
      Pages 15-29
    3. Werner Schindler, Kerstin Lemke, Christof Paar
      Pages 30-46
  3. Arithmetic for Cryptanalysis

    1. Jean Sébastien Coron, David Lefranc, Guillaume Poupard
      Pages 47-60
    2. P. J. Green, R. Noad, N. P. Smart
      Pages 61-74
  4. Low Resources

    1. Johann Großschädl, Roberto M. Avanzi, Erkay Savaş, Stefan Tillich
      Pages 75-90
    2. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
      Pages 91-105
    3. Lejla Batina, David Hwang, Alireza Hodjat, Bart Preneel, Ingrid Verbauwhede
      Pages 106-118
  5. Special Purpose Hardware

    1. Jens Franke, Thorsten Kleinjung, Christof Paar, Jan Pelzl, Christine Priplata, Colin Stahlke
      Pages 119-130
    2. Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer
      Pages 131-146
    3. Marco Bucci, Raimondo Luzzi
      Pages 147-156
  6. Hardware Attacks and Countermeasures I

    1. Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald
      Pages 157-171
    2. Wieland Fischer, Berndt M. Gammel
      Pages 187-200
  7. Arithmetic for Cryptography

  8. Side Channel II (EM)

    1. Catherine H. Gebotys, Simon Ho, C. C. Tiu
      Pages 250-264

About these proceedings

Keywords

AES DES Elliptic Curve Cryptography Error-correcting Code Hardware Routing Trusted Computing cryptanalysis cryptographic hardware embedded cryptographic systems finite field arithmetic hardware implementation low power devices security side-channel attacks

Editors and affiliations

  • Josyula R. Rao
    • 1
  • Berk Sunar
    • 2
  1. 1.IBM Watson Research CenterYorktown HeightsUSA
  2. 2.Cryptography & Information Security LaboratoryWPIWorcesterUSA

Bibliographic information