Cryptographic hardware and embedded systems-- CHES 2012 [electronic resource] : 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings / Emmanuel Prouff, Patrick Schaumont (eds.)
This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers a...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , |
Other title: | CHES 2012. |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2012.
|
Series: | Lecture notes in computer science ;
7428. LNCS sublibrary. Security and cryptology. |
Subjects: |
Table of Contents:
- 3D Hardware Canaries / Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger and Sylvain Guilley, et al.
- Breakthrough Silicon Scanning Discovers Backdoor in Military Chip / Sergei Skorobogatov and Christopher Woods
- Simple Photonic Emission Analysis of AES: Photonic Side Channel Analysis for the Rest of Us / Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic and Jean-Pierre Seifert
- Compiler Assisted Masking / Andrew Moss, Elisabeth Oswald, Dan Page and Michael Tunstall
- Threshold Implementations of All 3 x 3 and 4 x 4 S-Boxes / Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen and Georg Stütz
- How Far Should Theory Be from Practice? Evaluation of a Countermeasure / Amir Moradi and Oliver Mischke
- Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking / Blandine Debraize
- A Differential Fault Attack on the Grain Family of Stream Ciphers / Subhadeep Banik, Subhamoy Maitra and Santanu Sarkar
- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model / Yossef Oren, Mathieu Renauld, François-Xavier Standaert and Avishai Wool.
- Selecting Time Samples for Multivariate DPA Attacks / Oscar Reparaz, Benedikt Gierlichs and Ingrid Verbauwhede
- Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting / Benoît Gérard and François-Xavier Standaert
- Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs / Marcel Medwed, François-Xavier Standaert and Antoine Joux
- Practical Leakage-Resilient Symmetric Cryptography / Sebastian Faust, Krzysztof Pietrzak and Joachim Schipper
- A Statistical Model for DPA with Novel Algorithmic Confusion Analysis / Yunsi Fei, Qiasi Luo and A. Adam Ding
- Practical Security Analysis of PUF-Based Two-Player Protocols / Ulrich Rührmair and Marten van Dijk
- Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment / Vincent van der Leest, Bart Preneel and Erik van der Sluis
- PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon / Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi and Ingrid Verbauwhede, et al.
- PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator / Roel Maes, Anthony Van Herrewege and Ingrid Verbauwhede
- NEON Crypto / Daniel J. Bernstein and Peter Schwabe
- Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware / Stefan Heyse and Tim Güneysu
- Solving Quadratic Equations with XL on Parallel Architectures / Chen-Mou Cheng, Tung Chou, Ruben Niederhagen and Bo-Yin Yang
- Efficient Implementations of MQPKS on Constrained Devices / Peter Czypek, Stefan Heyse and Enrico Thomae
- Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint / Stéphanie Kerckhof, François Durvaux, Cédric Hocquet, David Bol and François-Xavier Standaert
- Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation / Seiichi Matsuda and Shiho Moriai
- Low-Latency Encryption
- Is "Lightweight = Light + Wait"? / Miroslav Knežević, Ventzislav Nikov and Peter Rombouts.
- Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication / Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi and Jean-Christophe Zapalowicz
- Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA / Michael Vielhaber
- Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents / Santanu Sarkar and Subhamoy Maitra
- Pushing the Limits of High-Speed GF(2m) Elliptic Curve Scalar Multiplication on FPGAs / Chester Rebeiro, Sujoy Sinha Roy and Debdeep Mukhopadhyay
- On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes / Norman Göttert, Thomas Feller, Michael Schneider, Johannes Buchmann and Sorin Huss
- Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems / Tim Güneysu, Vadim Lyubashevsky and Thomas Pöppelmann
- An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor / Jen-Wei Lee, Szu-Chi Chung, Hsie-Chia Chang and Chen-Yi Lee.