Advertisement

© 2005

Cryptographic Hardware and Embedded Systems – CHES 2005

7th International Workshop, Edinburgh, UK, August 29 – September 1, 2005. Proceedings

  • Josyula R. Rao
  • Berk Sunar
Conference proceedings CHES 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3659)

Table of contents

  1. Side Channel II (EM)

    1. Markus G. Kuhn
      Pages 265-279
    2. Huiyun Li, A. Theodore Markettos, Simon Moore
      Pages 280-292
  2. Side Channel III

    1. Marc Joye, Pascal Paillier, Berry Schoenmakers
      Pages 293-308
    2. Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater
      Pages 309-323
  3. Trusted Computing

    1. Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble
      Pages 324-338
  4. Hardware Attacks and Countermeasures II

    1. Sergei Skorobogatov
      Pages 339-353
    2. Kris Tiri, David Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont et al.
      Pages 354-365
  5. Hardware Attacks and Countermeasures III

    1. Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
      Pages 366-382
    2. Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet
      Pages 383-397
  6. Efficient Hardware I

    1. T. Kerins, W. P. Marnane, E. M. Popovici, P. S. L. M. Barreto
      Pages 412-426
  7. Efficient Hardware II

    1. Tim Good, Mohammed Benaissa
      Pages 427-440
    2. D. Canright
      Pages 441-455
  8. Back Matter

About these proceedings

Keywords

AES DES Elliptic Curve Cryptography Error-correcting Code Hardware Routing Trusted Computing cryptanalysis cryptographic hardware embedded cryptographic systems finite field arithmetic hardware implementation low power devices security side-channel attacks

Editors and affiliations

  • Josyula R. Rao
    • 1
  • Berk Sunar
    • 2
  1. 1.IBM Watson Research CenterYorktown HeightsUSA
  2. 2.Cryptography & Information Security LaboratoryWPIWorcesterUSA

Bibliographic information