This book constitutes the refereed proceedings of the 6th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, held in Cambridge, MA, USA in August 2004.
The 32 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on side channels, modular multiplication, low resources, implementation aspects, collision attacks, fault attacks, hardware implementation, and authentication and signatures.
Author(s): Jason Waddle, David Wagner (auth.), Marc Joye, Jean-Jacques Quisquater (eds.)
Series: Lecture Notes in Computer Science 3156
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004
Language: English
Pages: 462
Tags: Data Encryption; Computer Communication Networks; Special Purpose and Application-Based Systems; Logic Design; Operating Systems; Management of Computing and Information Systems
Front Matter....Pages -
Towards Efficient Second-Order Power Analysis....Pages 1-15
Correlation Power Analysis with a Leakage Model....Pages 16-29
Power Analysis of an FPGA....Pages 30-44
Long Modular Multiplication for Cryptographic Applications....Pages 45-61
Leak Resistant Arithmetic....Pages 62-75
Efficient Linear Array for Multiplication in GF (2 m ) Using a Normal Basis for Elliptic Curve Cryptography....Pages 76-91
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic....Pages 92-106
A Low-Cost ECC Coprocessor for Smartcards....Pages 107-118
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs....Pages 119-132
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p ) and GF(2 m )....Pages 133-147
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations....Pages 148-162
A Collision-Attack on AES....Pages 163-175
Enhancing Collision Attacks....Pages 176-190
Simple Power Analysis of Unified Code for ECC Double and Add....Pages 191-204
DPA on n -Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction....Pages 205-219
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve....Pages 220-229
Switching Blindings with a View Towards IDEA....Pages 230-239
Fault Analysis of Stream Ciphers....Pages 240-253
A Differential Fault Attack Against Early Rounds of (Triple-)DES....Pages 254-267
An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications....Pages 268-281
Improving the Security of Dual-Rail Circuits....Pages 282-297
A New Attack with Side Channel Leakage During Exponent Recoding Computations....Pages 298-311
Defeating Countermeasures Based on Randomized BSD Representations....Pages 312-327
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems....Pages 328-342
Efficient Countermeasures against RPA, DPA, and SPA....Pages 343-356
Strong Authentication for RFID Systems Using the AES Algorithm....Pages 357-370
TTS: High-Speed Signatures on a Low-Cost Smart Card....Pages 371-385
XTR Implementation on Reconfigurable Hardware....Pages 386-399
Concurrent Error Detection Schemes for Involution Ciphers....Pages 400-412
Public Key Authentication with One (Online) Single Addition....Pages 413-427
Attacking DSA Under a Repeated Bits Assumption....Pages 428-440
How to Disembed a Program?....Pages 441-454
Back Matter....Pages -