Cryptographic hardware and embedded systems. 1st international workshop CHES '99, Worcester, MA, USA, August 12--13, 1999. Proceedings (Q1960337)

From MaRDI portal





scientific article; zbMATH DE number 1386137
Language Label Description Also known as
English
Cryptographic hardware and embedded systems. 1st international workshop CHES '99, Worcester, MA, USA, August 12--13, 1999. Proceedings
scientific article; zbMATH DE number 1386137

    Statements

    Cryptographic hardware and embedded systems. 1st international workshop CHES '99, Worcester, MA, USA, August 12--13, 1999. Proceedings (English)
    0 references
    10 January 2000
    0 references
    The articles of mathematical interest will be reviewed individually. Indexed articles: \textit{Shamir, Adi}, Factoring large numbers with the TWINKLE device. (Extended abstract)., 2-12 [Zbl 1044.11630] \textit{Hamer, Ivan; Chow, Paul}, DES cracking on the transmogrifier 2a, 13-24 [Zbl 0983.94035] \textit{Choi, W. P.; Cheng, L. M.}, Modelling the crypto-processor from design to synthesis, 25-36 [Zbl 0987.68523] \textit{Wilcox, D. Craig; Pierson, Lyndon G.; Robertson, Perry J.; Witzke, Edward L.; Gass, Karl}, A DES ASIC suitable for network encryption at 10 Gbps and beyond, 37-48 [Zbl 0988.94516] \textit{Hong, Eunjong; Chung, Jai-Hoon; Lim, Chae Hoon}, Hardware design and performance estimation of the 128-bit block cipher CRYPTON, 49-60 [Zbl 1010.68500] \textit{Itoh, Kouichi; Takenaka, Masahiko; Torii, Naoya; Temma, Syouji; Kurihara, Yasushi}, Fast implementation of public-key cryptography on a DSP TMS320C6201, 61-72 [Zbl 0955.94004] \textit{Lee, Pil Joong; Lee, Eun Jeong; Kim, Yong Duk}, How to implement cost-effective and secure public key cryptosystems, 73-79 [Zbl 0955.94014] \textit{Walter, Colin D.}, Montgomery's multiplication technique: How to make it smaller and faster, 80-93 [Zbl 0955.68007] \textit{Tenca, Alexandre F.; Koç, Çetin K.}, A scalable architecture for Montgomery multiplication, 94-108 [Zbl 0955.68006] \textit{Horváth, Tamás}, Arithmetic design for permutation groups, 109-121 [Zbl 1016.94515] \textit{Silverman, Joseph H.}, Fast multiplication in finite fields GF\((2^N)\), 122-134 [Zbl 0993.11065] \textit{Kaliski, Burton S. jun.; Liskov, Moses}, Efficient finite field basis conversion involving dual bases, 135-143 [Zbl 0976.94022] \textit{Messerges, Thomas S.; Dabbish, Ezzy A.; Sloan, Robert H.}, Power analysis attacks of modular exponentiation in smartcards, 144-157 [Zbl 0955.94015] \textit{Goubin, Louis; Patarin, Jacques}, DES and differential power analysis. The ''duplication'' method, 158-172 [Zbl 0955.94011] \textit{Fahn, Paul N.}, IPA: A new class of power attacks, 173-186 [Zbl 0955.94010] \textit{von Faber, Eberhard}, Security evaluation schemas for the public and private market with a focus on smart card systems, 187-203 [Zbl 0955.94006] \textit{Bagini, Vittorio; Bucci, Marco}, A design of reliable true random number generator for cryptographic applications, 204-218 [Zbl 0955.94008] \textit{Maher, David P.; Rance, Robert J.}, Random number generators founded on signal and information theory, 219-230 [Zbl 0988.94514] \textit{Taylor, R. Reed; Goldstein, Seth Copen}, A high-performance flexible architecture for cryptography, 231-245 [Zbl 0955.68044] \textit{Mosanya, Emeka; Teuscher, Christof; Restrepo, Héctor Fabio; Galley, Patrick; Sanchez, Eduardo}, CryptoBooster: A reconfigurable and modular cryptographic coprocessor, 246-256 [Zbl 0988.94515] \textit{Gao, Lijun; Shrivastava, Sarvesh; Sobelman, Gerald E.}, Elliptic curve scalar multiplier design using FPGAs, 257-268 [Zbl 0987.94031] \textit{Wu, Huapeng; Hasan, M. Anwarul; Blake, Ian F.}, Highly regular architectures for finite field computation using redundant basis, 269-279 [Zbl 0976.94025] \textit{Wu, Huapeng}, Low complexity bit-parallel finite field arithmetic using polynomial basis, 280-291 [Zbl 0976.94026] \textit{Coron, Jean-Sébastien}, Resistance against differential power analysis for elliptic curve cryptosystems, 292-302 [Zbl 0955.94009] \textit{Handschuh, Helena; Paillier, Pascal; Stern, Jacques}, Probing attacks on tamper-resistant devices, 303-315 [Zbl 0955.94012] \textit{López, Julio; Dahab, Ricardo}, Fast multiplication on elliptic curves over GF\((2^m)\) without precomputation, 316-327 [Zbl 0993.11064] \textit{Hartmann, Michael; Paulus, Sachar; Takagi, Tsuyoshi}, NICE -- New Ideal Coset Encryption, 328-339 [Zbl 0953.94022] \textit{Jung, Oliver; Ruland, Christoph}, Encryption with statistical self-synchronization in synchronous broadband networks, 340-352 [Zbl 0955.68043]
    0 references
    Worcester, MA (USA)
    0 references
    Proceedings
    0 references
    Workshop
    0 references
    CHES '99
    0 references
    Cryptographic hardware
    0 references
    Embedded systems
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references