Cryptographic Hardware and Embedded Systems: First InternationalWorkshop, CHES’99 Worcester, MA, USA, August 12–13, 1999 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, CHES'99, held in Worcester, MA, USA in August 1999. The 27 revised papers presented together with three invited contributions were carefully reviewed and selected from 42 submissions. The papers are organized in sections on cryptographic hardware, hardware architectures, smartcards and embedded systems, arithmetic algorithms, power attacks, true random numbers, cryptographic algorithms on FPGAs, elliptic curve implementations, new cryptographic schemes and modes of operation.

Author(s): Brian D. Snow (auth.), Çetin K. Koç, Christof Paar (eds.)
Series: Lecture Notes in Computer Science 1717
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1999

Language: English
Pages: 356
Tags: Data Encryption; Computer Communication Networks; Special Purpose and Application-Based Systems; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science

We Need Assurance....Pages 1-1
Factoring Large Numbers with the TWINKLE Device....Pages 2-12
DES Cracking on the Transmogrifier 2a....Pages 13-24
Modelling the Crypto-Processor from Design to Synthesis....Pages 25-36
A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond....Pages 37-48
Hardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTON....Pages 49-60
Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201....Pages 61-72
How to Implement Cost-Effective and Secure Public Key Cryptosystems....Pages 73-79
Montgomery’s Multiplication Technique: How to Make It Smaller and Faster....Pages 80-93
A Scalable Architecture for Montgomery Nultiplication....Pages 94-108
Arithmetic Design for Permutation Groups....Pages 109-121
Fast Multiplication in Finite Fields GF(2 n )....Pages 122-134
Efficient Finite Field Basis Conversion Involving dual bases....Pages 135-143
Power Analysis Attacks of Modular Exponentiation in Smartcards....Pages 144-157
DES and Differential Power Analysis The “Duplication” Method....Pages 158-172
IPA: A New Class of Power Attacks....Pages 173-186
Security Evaluation Schemas for the Public and Private Market with a Focus on Smart Card Systems....Pages 187-203
A Design of Reliable True Random Number Generator for Cryptographic Applications....Pages 204-218
Random Number Generators Founded on Signal and Information Theory....Pages 219-230
A High-Performance Flexible Architecture for Cryptography....Pages 231-245
CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor....Pages 246-256
Elliptic Curve Scalar Multiplier Design Using FPGAs....Pages 257-268
Highly Regular Architectures for Finite Field Computation Using Redundant Basis....Pages 269-279
Low Complexity Bit-Parallel Finite Field Arithmetic Using Polynomial Basis....Pages 280-291
Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems....Pages 292-302
Probing Attacks On Tamper-Resistant Devices....Pages 303-315
Fast Multiplication on Elliptic Curves Over GF (2 m ) without precomputation....Pages 316-327
NICE - New Ideal Coset Encryption -....Pages 328-339
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks....Pages 340-352