加密硬件与嵌入系统 - CHES 2006/会议录 Cryptographic hardware and embedded systems--CHES 2006

分类: 图书,计算机/网络,计算机体系结构,
作者: Louis Goubin等著
出 版 社: 湖南文艺出版社
出版时间: 2006-12-1字数:版次: 1页数: 462印刷时间: 2006/12/01开本:印次:纸张: 胶版纸I S B N : 9783540465591包装: 平装编辑推荐
The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form.Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science research forum available.
The scope of LNCS including its subseries LNAI spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.The type of material published traditionally includes.
—proceedings (published in time for the respective conference)
—post-proceedings (consisting of thoroughly revised final full papers)
—research monographs(which may be based on outstanding PhD work,research projects,technical reports,etc.)
内容简介
This book constitutes the refereed proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006, held in Yokohama, Japan in October 2006.
The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, side channels, hardware attacks and countermeasures, efficient hardware, trusted computing, side channels, hardware attacks and countermeasures, as well as efficient hardware.
目录
Side Channels I
Template Attacks in Principal Subspaces
Templates vs. Stochastic Methods
Towards Security Limits in Side-Channel Attacks
Low Resources
HIGHT: A New Block Cipher Suitable for Low-Resource Device
Invited Talk I
Integer Factoring Utilizing PC Cluster
Hardware Attacks and Countermeasures I
Optically Enhanced Position-Locked Power Analysis
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Special Purpose Hardware
Breaking Ciphers with COPACOBANA A Cost-Optimized Parallel Code Breaker.
Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware
Efficient Algorithms for Embedded Processors
Implementing Cryptographic Pairings on Smartcards SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form
Fast Generation of Prime Numbers on Portable Devices: An Update...
Side Channels II
A Proposition for Correlation Power Analysis Enhancement
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
Cache-Collision Timing Attacks Auainst AES
Provably Secure S-Box Implementation Based on Fourier Transform ...
Invited Talk II
The Outer Limits of RFID Security
Hardware Attacks and Countermeasures
Efficient Hardware
Trusted Commputing
Side Channels
Hardware Attacks and Countermeasures
Invited Talk
Efficient Hardware
Author Index