Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings - Lecture Notes in Computer Science 1965 (Paperback)
  • Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings - Lecture Notes in Computer Science 1965 (Paperback)
zoom

Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings - Lecture Notes in Computer Science 1965 (Paperback)

(editor), (editor)
£54.99
Paperback 360 Pages / Published: 13/12/2000
  • We can order this

Usually despatched within 3 weeks

  • This item has been added to your basket
These are the pre-proceedings of CHES 2000, the second workshop on Cryp- graphicHardware andEmbedded Systems. The rst workshop, CHES'99, which was held at WPI in August 1999, was received quite enthusiastically by people in academia and industry who are interested in hardware and software imp- mentations of cryptography. We believe there has been a long-standing need for a workshop series combining theory and practice for integrating strong data - curity into modern communications and e-commerce applications. We are very glad that we had the opportunity to serve this purpose and to create the CHES workshop series. As is evident by the papers in these proceedings, there have been many excellentcontributions.Selectingthepapersforthisyear'sCHESwasnotaneasy task, and we regret that we had to reject several good papers due to the limited availability of time. There were 51 submitted contributions to CHES 2000, of which 25 were selected for presentation. This corresponds to a paper acceptance rate of 49% for this year, which is a decrease from the 64% acceptance rate for CHES'99.Allpaperswerereviewed.Inadditiontothecontributedpresentations, we have invited two speakers. As last year, the focus of the workshop is on all aspects of cryptographic hardware and embedded system design. Of special interest were contributions that describe new methods for e cient hardware implementations and hi- speed software for embedded systems, e.g., smart cards, microprocessors, DSPs, etc. In addition, there were again several very interesting and innovative - pers dealingwith cryptanalysis in practice, rangingfrom side-channel attacks to FPGA-based attack hardware.

Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
ISBN: 9783540414551
Number of pages: 360
Weight: 1150 g
Dimensions: 235 x 155 x 19 mm
Edition: 2000 ed.

You may also be interested in...

Data and Goliath
Added to basket
£12.99
Paperback
The Hacked World Order
Added to basket
The Perfect Weapon
Added to basket
£14.99
Paperback
Desk Wars
Added to basket
£9.99
Paperback
Hello World
Added to basket
£18.99
Hardback
Cyber Crime & Warfare: All That Matters
Added to basket
Carry On
Added to basket
£23.99
Hardback
Creative Superpowers
Added to basket
Cyberphobia
Added to basket
£9.99
Paperback
Intercept
Added to basket
£8.99
Paperback
Ghost in the Wires
Added to basket
The Darkening Web
Added to basket
DarkMarket
Added to basket
£10.99
Paperback
Cyber Attack Survival Manual
Added to basket

Reviews

Please sign in to write a review

Your review has been submitted successfully.