Table Of Contents
Front Covers
Cover1
Cover2
SPECIAL SECTION on Special-Purpose Hardware for Cryptography and Cryptanalysis
Guest Editors' Introduction to the Special Section on Special-Purpose Hardware for Cryptography and Cryptanalysis
Rainer Steinwandt, Willi Geiselmann, Çetin Kaya Koç
High-Performance Architecture of Elliptic Curve Scalar Multiplication
Bijan Ansari, M. Anwar Hasan
Algorithms and Arithmetic Operators for Computing the \eta_{T} Pairing in Characteristic Three
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi
Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation
Vassil S. Dimitrov, Kimmo U. Järvinen, Michael J. Jacobson Jr., Wai Fong (Andy) Chan, Zhun Huang
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks
Sylvain Guilley, Laurent Sauvage, Philippe Hoogvorst, Renaud Pacalet, Guido Marco Bertoni, Sumanta Chaudhuri
Cryptanalysis with COPACOBANA
Tim Güneysu, Timo Kasper, Martin Novotný, Christof Paar, Andy Rupp
Elliptic-Curve-Based Security Processor for RFID
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede
Double-Data-Rate Computation as a Countermeasure against Fault Analysis
Paolo Maistri, Régis Leveugle
Protection Circuit against Differential Power Analysis Attacks for Smart Cards
Radu Muresan, Stefano Gregori
Regular Papers
Novel Table Lookup-Based Algorithms for High-Performance CRC Generation
Michael E. Kounavis, Frank L. Berry
Efficient Approximate Wordlength Optimization
Paul D. Fiore
Configurable Flash-Memory Management: Performance versus Overheads
Jen-Wei Hsieh, Yi-Lin Tsai, Tei-Wei Kuo, Tzao-Lin Lee
Ads
Build Your Career in Computing
Back Covers
Cover3
Cover4
|