Amazon cover image
Image from Amazon.com

Cryptographic Hardware and Embedded Systems: CHES 2006

Contributor(s): Material type: TextTextPublication details: Springer Germany 2006Description: 462pISBN:
  • 9783540465591
Subject(s): DDC classification:
  • 005.8 CRY
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Item location Collection Call number Status Date due Barcode Item holds
Reference Book Reference Book NIMA Knowledge Centre 7th Floor Silence Zone Reference 005.8 CRY (Browse shelf(Opens below)) Not For Loan T0050140
Total holds: 0

Template Attacks in Principal Subspaces
Templates vs. Stochastic Methods
Towards Security Limits in Side-Channel Attacks
HIGHT: A New Block Cipher Suitable for Low-Resource Device
Integer Factoring Utilizing PC Cluster
Optically Enhanced Position-Locked Power Analysis
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Breaking Ciphers with COPACOBANA –A Cost-Optimized Parallel Code Breaker
Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware
Implementing Cryptographic Pairings on Smartcards
SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form
Fast Generation of Prime Numbers on Portable Devices: An Update
A Proposition for Correlation Power Analysis Enhancement
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
Cache-Collision Timing Attacks Against AES
Provably Secure S-Box Implementation Based on Fourier Transform
The Outer Limits of RFID Security
Three-Phase Dual-Rail Pre-charge Logic
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors
NanoCMOS-Molecular Realization of Rijndael
Improving SHA-2 Hardware Implementations
Offline Hardware/Software Authentication for Reconfigurable Platforms
Why One Should Also Secure RSA Public Key Elements
Power Attack on Small RSA Public Exponent
Unified Point Addition Formulæ and Side-Channel Attacks
Read-Proof Hardware from Protective Coatings
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
Challenges for Trusted Computing
Superscalar Coprocessor for High-Speed Curve-Based Cryptography
Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller
FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers

There are no comments on this title.

to post a comment.
© 2025 by NIMA Knowledge Centre, Ahmedabad.
Koha version 24.05