Limit this search to....

Cryptographic Hardware and Embedded Systems -- Ches 2003: 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings 2003 Edition
Contributor(s): Walter, Colin D. (Editor), Koc, Cetin K. (Editor), Paar, Christof (Editor)
ISBN: 3540408339     ISBN-13: 9783540408338
Publisher: Springer
OUR PRICE:   $52.24  
Product Type: Paperback - Other Formats
Published: September 2003
Qty:
Annotation: This book constitutes the refereed proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2003, held in Cologne, Germany in September 2003.

The 32 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on side channel attack methodology, hardware factorization, symmetric cypher attacks and countermeasures, secure hardware logic, random number generators, efficient multiplication, efficient arithmetics, attacks on asymmetric cryptosystems, implementation of symmetric cyphers, hyperelliptic curve cryptography, countermeasures to side channel leakage, and security of standards.

Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Computers | Computer Science
- Computers | Logic Design
Dewey: 005.8
LCCN: 2003058585
Series: Lecture Notes in Computer Science
Physical Information: 0.93" H x 6.14" W x 9.21" (1.41 lbs) 446 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
These are the proceedings of CHES 2003, the ?fth workshop on Cryptographic HardwareandEmbeddedSystems, heldinCologneonSeptember8-10,2003.As with every previous workshop, there was a record number of submissions despite themuchearlierdeadlineinthisyear'scallforpapers.Thisisaclearindication of the growing international importance of the scope of the conference and the relevance of the subject material to both industry and academia. The increasing competition for presenting at the conference has led to many excellent papers and a higher standard overall. From the 111 submissions, time constraintsmeantthatonly32couldbeaccepted.Theprogramcommitteewo- ed very hard to select the best. However, at the end of the review process there were a number of good papers - which it would like to have included but for which, sadly, there was insu?cient space. In addition to the accepted papers appearing in this volume, there were three invited presentations from Hans D- bertin (Ruhr-Universit] at Bochum, Germany), Adi Shamir (Weizmann Institute, Israel), and Frank Stajano (University of Cambridge, UK), and a panel d- cussion on the e?ectiveness of current hardware and software countermeasures against side channel leakage in embedded cryptosystems.