Crypto Engineering: Some History and Some Case Studies

(Extended Abstract)
  • Christof Paar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5747)

Abstract of the Extended Abstract.

In this extended abstract, I will first try to describe briefly the developments in the cryptographic engineering community over the last decade. After this, some hopefully instructive case studies about cryptographic implementations in the real world will be given.

References

  1. 1.
    Bogdanov, A.: Attacks on the KeeLoq Block Cipher and Authentication Systems. In: 3rd Conference on RFID Security 2007, RFIDSec 2007 (2007), http://rfidsec07.etsit.uma.es/slides/papers/paper-22.pdf
  2. 2.
    Bogdanov, A., Leander, G., Knudsen, L.R., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT - An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking computations (1996), http://citeseer.ist.psu.edu/491209.html
  4. 4.
    Courtois, N.T., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, Springer, Heidelberg (2008)CrossRefGoogle Scholar
  5. 5.
    Eldridge, S.E., Walter, C.D.: Hardware implementation of Montgomery’s modular multiplication algorithm. IEEE Transactions on Computers 42(6), 693–699 (1993)CrossRefGoogle Scholar
  6. 6.
    Güneysu, T., Paar, C.: Ultra High Performance ECC over NIST Primes on Commercial FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 62–78. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  7. 7.
    Indesteege, S., Keller, N., Dunkelman, O., Biham, E., Preneel, B.: A Practical Attack on KeeLoq. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, Springer, Heidelberg (2008)Google Scholar
  8. 8.
    Koc, C.K., Acar, T., Burton, J., Kaliski, S.: Analyzing and comparing montgomery multiplication algorithms. IEEE Micro 16(3), 26–33 (1996)CrossRefGoogle Scholar
  9. 9.
    Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 388. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  10. 10.
    Kumar, S.: Elliptic Curve Cryptography for Constrained Devices. PhD thesis, Electrical Engineering and Information Sciences Department, Ruhr-University of Bochum (2006)Google Scholar
  11. 11.
    Rolfes, C., Poschmann, A., Leander, G., Paar, C.: Ultra-Lightweight Implementations for Smart Devices-Security for 1000 Gate Equivalents. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 89–103. Springer, Heidelberg (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Christof Paar
    • 1
  1. 1.Chair for Embedded Security, Electrical Engineering and Information Sciences Dept.Ruhr-Universität BochumGermany

Personalised recommendations