Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing

The Trusted Mobile Platform (TMP) is developed and promoted by the Trusted Computing Group (TCG), which is an industry standard body to enhance the security of the mobile computing environment. The built-in SHA-1 engine in TMP is one of the most important

  • PDF / 15,011,089 Bytes
  • 521 Pages / 430.15 x 660.926 pts Page_size
  • 66 Downloads / 192 Views

DOWNLOAD

REPORT


Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

4861

Sihan Qing Hideki Imai Guilin Wang (Eds.)

Information and Communications Security 9th International Conference, ICICS 2007 Zhengzhou, China, December 12-15, 2007 Proceedings

13

Volume Editors Sihan Qing Chinese Academy of Sciences Institute of Software Beijing 100080, China E-mail: [email protected] Hideki Imai Chuo University Faculty of Science and Engineering Tokyo 112-8551, Japan E-mail: [email protected] Guilin Wang University of Birmingham School of Computer Science Birmingham B15 2TT, UK E-mail: [email protected]

Library of Congress Control Number: 2007940029 CR Subject Classification (1998): E.3, G.2.1, D.4.6, K.6.5, F.2.1, C.2, J.1 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN ISBN-10 ISBN-13

0302-9743 3-540-77047-X Springer Berlin Heidelberg New York 978-3-540-77047-3 Springer Berlin Heidelberg New York

This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2007 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12198054 06/3180 543210

Preface

The ninth International Conference on Information and Communications Security, ICICS 2007, was held in Zhengzhou, Henan Province, China, December 12–15, 2007. The ICICS conference series is an established forum that brings together people working in different fields of information and communications security from universities, research institutes, industry and government institutions, and gives the attendees the opportunity to exchange new ideas and investigate state-of-the-art developments. Among