Studium, Ausbildung und Beruf

web uni-protokolle.de
 powered by
NachrichtenLexikonProtokolleBücherForenFreitag, 24. Oktober 2014 

Cryptographic Hardware and Embedded Systems. First International Workshop, CHES'99 Worcester, MA, USA, August 12-13, 1999 Proceedings (Lecture Notes in Computer Science Vol. 1717)


von Cetin K. Koc

Kategorie: Embedded Systems
ISBN: 354066646X

Kommentar abgeben

Kurzbeschreibung This book constitutes the refereed proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, CHES'99, held in Worcester, MA, USA in August 1999. The 27 revised papers presented together with three invited contributions were carefully reviewed and selected from 42 submissions. The papers are organized in sections on cryptographic hardware, hardware architectures, smartcards and embedded systems, arithmetic algorithms, power attacks, true random numbers, cryptographic algorithms on FPGAs, elliptic curve implementations, new cryptographic schemes and modes of operation.

Synopsis This text constitutes the refereed proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems (CHES '99), held in Worcester, Massachussetts, USA in August 1999. The 27 papers presented together with three invited contributions are organized in sections on cryptographic hardware, hardware architectures, smartcards and embedded systems, arithmetic algorithms, power attacks, true random numbers, cryptographic algorithms on FPGAs, elliptic curve implementations,...


Embedded Systems > Cryptographic Hardware and Embedded Systems. First International Workshop, CHES'99 Worcester, MA, USA, August 12-13, 1999 Proceedings (Lecture Notes in Computer Science Vol. 1717)
ImpressumLesezeichen setzenSeite versendenSeite drucken

HTML-Code zum Verweis auf diese Seite:
<a href="http://www.uni-protokolle.de/buecher/isbn/354066646X/">Cryptographic Hardware and Embedded Systems. First International Workshop, CHES'99 Worcester, MA, USA, August 12-13, 1999 Proceedings (Lecture Notes in Computer Science Vol. 1717) </a>