Cryptographic Hardware and Embedded Systems - CHES 2007 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings /
CHES2007,theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) and held in Vienna, Austria, September 10–13, 2007. The workshop - ceived 99 submissions from 24 countries, of which the Program Committee (39 members fr...
Corporate Author: | |
---|---|
Other Authors: | , |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edition: | 1st ed. 2007. |
Series: | Security and Cryptology ;
4727 |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-3-540-74735-2 |
Table of Contents:
- Differential and Higher Order Attacks
- A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter
- Gaussian Mixture Models for Higher-Order Side Channel Analysis
- Side Channel Cryptanalysis of a Higher Order Masking Scheme
- Random Number Generation and Device Identification
- High-Speed True Random Number Generation with Logic Gates Only
- FPGA Intrinsic PUFs and Their Use for IP Protection
- Logic Styles: Masking and Routing
- Evaluation of the Masked Logic Style MDPL on a Prototype Chip
- Masking and Dual-Rail Logic Don’t Add Up
- DPA-Resistance Without Routing Constraints?
- Efficient Algorithms for Embedded Processors
- On the Power of Bitslice Implementation on Intel Core2 Processor
- Highly Regular Right-to-Left Algorithms for Scalar Multiplication
- MAME: A Compression Function with Reduced Hardware Requirements
- Collision Attacks and Fault Analysis
- Collision Attacks on AES-Based MAC: Alpha-MAC
- Secret External Encodings Do Not Prevent Transient Fault Analysis
- Two New Techniques of Side-Channel Cryptanalysis
- High Speed AES Implementations
- AES Encryption Implementation and Analysis on Commodity Graphics Processing Units
- Multi-gigabit GCM-AES Architecture Optimized for FPGAs
- Public-Key Cryptography
- Arithmetic Operators for Pairing-Based Cryptography
- FPGA Design of Self-certified Signature Verification on Koblitz Curves
- How to Maximize the Potential of FPGA Resources for Modular Exponentiation
- Implementation Cost of Countermeasures
- TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks
- Power Analysis Resistant AES Implementation with Instruction Set Extensions
- Security Issues for RF and RFID
- Power and EM Attacks on Passive RFID Devices
- RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
- RF-DNA: Radio-Frequency Certificates of Authenticity
- Special Purpose Hardware for Cryptanalysis
- CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method
- Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA
- A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
- Side Channel Analysis
- Differential Behavioral Analysis
- Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
- Problems and Solutions for Lightweight Devices
- On the Implementation of a Fast Prime Generation Algorithm
- PRESENT: An Ultra-Lightweight Block Cipher
- Cryptographic Hardware and Embedded Systems - CHES 2007.