Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008809658/catalog> ?p ?o. }
Showing items 1 to 32 of
32
with 100 items per page.
- catalog contributor b12353723.
- catalog contributor b12353724.
- catalog contributor b12353725.
- catalog contributor b12353726.
- catalog created "2001.".
- catalog date "2001".
- catalog date "2001.".
- catalog dateCopyrighted "2001.".
- catalog description "Includes bibliographical references and index.".
- catalog description "NTRU in Constrained Devices / D. V. Bailey, D. Coffin and A. Elbirt / [et al.] -- Transparent Harddisk Encryption / T. Pornin -- Sliding Windows Succumbs to Big Mac Attack / C. D. Walter -- Universal Exponentiation Algorithm: A First Step towards Provable SPA-Resistance / C. Clavier and M. Joye -- An Implementation of DES and AES, Secure against Some Attacks / M. Akkar and C. Giraud -- Efficient Implementation of "Large" Stream Cipher Systems / P. Sarkar and S. Maitra -- Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA / O. Y. H. Cheung, K. H. Tsoi and P. H. W. Leong / [et al.] -- A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware / G. Orlando and C. Paar -- Implementation of RSA Algorithm Based on RNS Montgomery Multiplication / H. Nozaki, M. Motoyama and A. Shimbo / [et al.] -- Protections against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approach / M. Joye and C. Tymen -- ".
- catalog description "Preventing SPA/DPA in ECC Systems Using the Jacobi Form / P.-Y. Liardet and N. P. Smart -- Hessian Elliptic Curves and Side-Channel Attacks / M. Joye and J.-J. Quisquater.".
- catalog description "Protecting Embedded Systems -- The Next Ten Years / R. Anderson -- A Sound Method for Switching between Boolean and Arithmetic Masking / L. Goubin -- Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware / E. Brier, H. Handschuh and C. Tymen -- Random Register Renaming to Foil DPA / D. May, H. L. Muller and N. P. Smart -- Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks / E. Oswald and M. Aigner -- Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm / H. Kuo and I. Verbauwhede -- High Performance Single-Chip FPGA Rijndael Algorithm / M. McLoone and J. V. McCanny -- Two Methods of Rijndael Implementation in Reconfigurable Hardware / V. Fisher and M. Drutarovsky -- Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor / N. Howgrave-Graham, J. Dyer and R. Gennaro -- Efficient Online Tests for True Random Number Generators / W. Schindler -- ".
- catalog description "The Hessian Form of an Elliptic Curve / N. P. Smart -- Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve / K. Okeya and K. Sakurai -- Generating Elliptic Curves of Prime Order / E. Savas, T. A. Schmidt and C. K. Koc -- New Directions in Croptography / A. Shamir -- A New Low Complexity Parallel Multiplier for a Class of Finite fields / M. Leone -- Efficient Rijndael Encryption Implementation with Composite Field Arithmetic / A. Rudra, P. K. Dubey and C. S. Jutla / [et al.] -- High-Radix Design of a Scalable Modular Multiplier / A. F. Tenca, G. Todorov and C. K. Koc -- A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2[superscript m]) / J. Grossschadl -- Attacks on Cryptoprocessor Transaction Sets / M. Bond -- Bandwidth-Optimal Kleptographic Attacks / A. Young and M. Yung -- Electromagnetic Analysis: Concrete Results / K. Gandolfi, C. Mourtel and F. Olivier -- ".
- catalog extent "xiii, 410 p. :".
- catalog identifier "3540425217 (alk. paper)".
- catalog isPartOf "Lecture notes in computer science ; 2162".
- catalog issued "2001".
- catalog issued "2001.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer-Verlag,".
- catalog subject "005.8/2 21".
- catalog subject "Computer security Congresses.".
- catalog subject "Cryptography Congresses.".
- catalog subject "Embedded computer systems Congresses.".
- catalog subject "TK7895.E42 C454 2001".
- catalog tableOfContents "NTRU in Constrained Devices / D. V. Bailey, D. Coffin and A. Elbirt / [et al.] -- Transparent Harddisk Encryption / T. Pornin -- Sliding Windows Succumbs to Big Mac Attack / C. D. Walter -- Universal Exponentiation Algorithm: A First Step towards Provable SPA-Resistance / C. Clavier and M. Joye -- An Implementation of DES and AES, Secure against Some Attacks / M. Akkar and C. Giraud -- Efficient Implementation of "Large" Stream Cipher Systems / P. Sarkar and S. Maitra -- Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA / O. Y. H. Cheung, K. H. Tsoi and P. H. W. Leong / [et al.] -- A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware / G. Orlando and C. Paar -- Implementation of RSA Algorithm Based on RNS Montgomery Multiplication / H. Nozaki, M. Motoyama and A. Shimbo / [et al.] -- Protections against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approach / M. Joye and C. Tymen -- ".
- catalog tableOfContents "Preventing SPA/DPA in ECC Systems Using the Jacobi Form / P.-Y. Liardet and N. P. Smart -- Hessian Elliptic Curves and Side-Channel Attacks / M. Joye and J.-J. Quisquater.".
- catalog tableOfContents "Protecting Embedded Systems -- The Next Ten Years / R. Anderson -- A Sound Method for Switching between Boolean and Arithmetic Masking / L. Goubin -- Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware / E. Brier, H. Handschuh and C. Tymen -- Random Register Renaming to Foil DPA / D. May, H. L. Muller and N. P. Smart -- Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks / E. Oswald and M. Aigner -- Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm / H. Kuo and I. Verbauwhede -- High Performance Single-Chip FPGA Rijndael Algorithm / M. McLoone and J. V. McCanny -- Two Methods of Rijndael Implementation in Reconfigurable Hardware / V. Fisher and M. Drutarovsky -- Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor / N. Howgrave-Graham, J. Dyer and R. Gennaro -- Efficient Online Tests for True Random Number Generators / W. Schindler -- ".
- catalog tableOfContents "The Hessian Form of an Elliptic Curve / N. P. Smart -- Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve / K. Okeya and K. Sakurai -- Generating Elliptic Curves of Prime Order / E. Savas, T. A. Schmidt and C. K. Koc -- New Directions in Croptography / A. Shamir -- A New Low Complexity Parallel Multiplier for a Class of Finite fields / M. Leone -- Efficient Rijndael Encryption Implementation with Composite Field Arithmetic / A. Rudra, P. K. Dubey and C. S. Jutla / [et al.] -- High-Radix Design of a Scalable Modular Multiplier / A. F. Tenca, G. Todorov and C. K. Koc -- A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2[superscript m]) / J. Grossschadl -- Attacks on Cryptoprocessor Transaction Sets / M. Bond -- Bandwidth-Optimal Kleptographic Attacks / A. Young and M. Yung -- Electromagnetic Analysis: Concrete Results / K. Gandolfi, C. Mourtel and F. Olivier -- ".
- catalog title "Cryptographic hardware and embedded systems--CHES 2001 : third international workshop, Paris, France, May 14-16, 2001 : proceedings / Çetin K. Koç, David Naccache, Christof Paar (eds.)".
- catalog type "Conference proceedings. fast".
- catalog type "text".