Skip to main content
  • Conference proceedings
  • © 1999

Cryptographic Hardware and Embedded Systems

First International Workshop, CHES'99 Worcester, MA, USA, August 12-13, 1999 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1717)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

    Pages I-XI
  2. Invited Talk

    1. We Need Assurance

      • Brian D. Snow
      Pages 1-1
  3. Cryptanalytic Hardware

    1. DES Cracking on the Transmogrifier 2a

      • Ivan Hamer, Paul Chow
      Pages 13-24
  4. Hardware Architectures

    1. Modelling the Crypto-Processor from Design to Synthesis

      • W. P. Choi, L. M. Cheng
      Pages 25-36
    2. A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond

      • D. Craig Wilcox, Lyndon G. Pierson, Perry J. Robertson, Edward L. Witzke, Karl Gass
      Pages 37-48
    3. Hardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTON

      • Eunjong Hong, Jai-Hoon Chung, Chae Hoon Lim
      Pages 49-60
  5. Smartcards and Embedded Systems

    1. Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201

      • Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara
      Pages 61-72
    2. How to Implement Cost-Effective and Secure Public Key Cryptosystems

      • Pil Joong Lee, Eun Jeong Lee, Yong Duk Kim
      Pages 73-79
  6. Arithmetic Algorithms I

    1. A Scalable Architecture for Montgomery Nultiplication

      • Alexandre F. Tenca, Çetin K. Koç
      Pages 94-108
    2. Arithmetic Design for Permutation Groups

      • Tamás Horváth
      Pages 109-121
    3. Fast Multiplication in Finite Fields GF(2n)

      • Joseph H. Silverman
      Pages 122-134
    4. Efficient Finite Field Basis Conversion Involving dual bases

      • Burton S. Kaliski Jr, Moses Liskov
      Pages 135-143
  7. Power Attacks I

    1. Power Analysis Attacks of Modular Exponentiation in Smartcards

      • Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sloan
      Pages 144-157
    2. DES and Differential Power Analysis The “Duplication” Method

      • Louis Goubin, Jacques Patarin
      Pages 158-172
    3. IPA: A New Class of Power Attacks

      • Paul N. Fahn, Peter K. Pearson
      Pages 173-186
  8. True Random Number Generators

    1. Random Number Generators Founded on Signal and Information Theory

      • David P. Maher, Robert J. Rance
      Pages 219-230

Editors and Affiliations

  • Department of Electrical and Computer Engineering, Oregon State University, Corvallis, USA

    Çetin K. Koç

  • Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, USA

    Christof Paar

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access