Advertisement

Cryptographic Hardware and Embedded Systems - CHES 2003

5th International Workshop, Cologne, Germany, September 8–10, 2003. Proceedings

  • Colin D. Walter
  • Çetin K. Koç
  • Christof Paar
Conference proceedings CHES 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2779)

Table of contents

  1. Front Matter
  2. Invited Talk

  3. Side Channel Attack Methodology

    1. Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
      Pages 2-16
    2. Chris Karlof, David Wagner
      Pages 17-34
    3. Sıddıka Berna Örs, Elisabeth Oswald, Bart Preneel
      Pages 35-50
  4. Hardware Factorization

    1. Willi Geiselmann, Rainer Steinwandt
      Pages 51-61
  5. Symmetric Ciphers: Side Channel Attacks and Countermeasures

    1. Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi
      Pages 62-76
    2. Jean-Sébastien Coron, Alexei Tchulkine
      Pages 89-97
  6. Secure Hardware Logic

    1. Ramesh Karri, Grigori Kuznetsov, Michael Goessel
      Pages 113-124
    2. Jacques J. A. Fournier, Simon Moore, Huiyun Li, Robert Mullins, George Taylor
      Pages 137-151
  7. Random Number Generators

    1. Michael Epstein, Laszlo Hars, Raymond Krasinski, Martin Rosner, Hao Zheng
      Pages 152-165
    2. Boaz Barak, Ronen Shaltiel, Eran Tromer
      Pages 166-180
  8. Efficient Multiplication

  9. More on Efficient Arithmetic

    1. Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong
      Pages 228-242
    2. Marc Joye, Pascal Paillier
      Pages 243-253
  10. Attacks on Asymmetric Cryptosystems

    1. Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard
      Pages 254-268
    2. Pierre-Alain Fouque, Frederic Valette
      Pages 269-280
    3. Julien Cathalo, François Koeune, Jean-Jacques Quisquater
      Pages 291-303
  11. Implementation of Symmetric Ciphers

    1. Paweł Chodowiec, Kris Gaj
      Pages 319-333
    2. Francois-Xavier Standaert, Gael Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat
      Pages 334-350
  12. Hyperelliptic Curve Cryptography

  13. Countermeasures to Side Channel Leakage

  14. Security of Standards

    1. Jolyon Clulow
      Pages 411-425
    2. Vlastimil Klíma, Ondrej Pokorný, Tomáš Rosa
      Pages 426-440
  15. Back Matter

About these proceedings

Keywords

DSP Elliptic Curve Cryptography Hardware Standards cryptanalysis cryptographic hardware cryptography cypher implementation embedded cryptographic systems finite field arithmetic hardware implementation logic security smart cards systems security

Editors and affiliations

  • Colin D. Walter
    • 1
  • Çetin K. Koç
    • 2
  • Christof Paar
    • 3
  1. 1.Comodo Research LabBradfordUK
  2. 2.Information Security Research CenterIstanbul Commerce UniversityEminönü, IstanbulTurkey
  3. 3.Horst Görtz Institute for IT SecurityRuhr University BochumBochumGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-45238-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-40833-8
  • Online ISBN 978-3-540-45238-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering