default search action
15. CHES 2013: Santa Barbara, CA, USA
- Guido Bertoni, Jean-Sébastien Coron:
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings. Lecture Notes in Computer Science 8086, Springer 2013, ISBN 978-3-642-40348-4
Side-Channel Attacks
- Amir Moradi, Oliver Mischke:
On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme). 1-20 - Adrian Thillard, Emmanuel Prouff, Thomas Roche:
Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack. 21-36 - Carolyn Whitnall, Elisabeth Oswald:
Profiling DPA: Efficacy and Efficiency Trade-Offs. 37-54 - Yasser Shoukry, Paul D. Martin, Paulo Tabuada, Mani B. Srivastava:
Non-invasive Spoofing Attacks for Anti-lock Braking Systems. 55-72
Physical Unclonable Function
- Roel Maes:
An Accurate Probabilistic Reliability Model for Silicon PUFs. 73-89 - Mudit Bhargava, Ken Mai:
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement. 90-106 - Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs. 107-125
Lightweight Cryptography
- Peter Pessl, Michael Hutter:
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID. 126-141 - Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. 142-158
Hardware Implementations and Fault Attacks
- Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino:
On Measurable Side-Channel Leaks Inside ASIC Design Primitives. 159-178 - Abdelkarim Cherkaoui, Viktor Fischer, Laurent Fesquet, Alain Aubert:
A Very High Speed True Random Number Generator with Entropy Assessment. 179-196 - Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson:
Stealthy Dopant-Level Hardware Trojans. 197-214 - Subhadeep Banik, Subhamoy Maitra:
A Differential Fault Attack on MICKEY 2.0. 215-232
Efficient and Secure Implementations
- Karim Bigou, Arnaud Tisserand:
Improving Modular Inversion in RNS Using the Plus-Minus Method. 233-249 - Daniel J. Bernstein, Tung Chou, Peter Schwabe:
McBits: Fast Constant-Time Code-Based Cryptography. 250-272 - Stefan Heyse, Ingo von Maurich, Tim Güneysu:
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices. 273-292 - Ali Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne:
Sleuth: Automated Verification of Software Power Analysis Countermeasures. 293-310
Elliptic Curve Cryptography
- Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez:
Lambda Coordinates for Binary Elliptic Curves. 311-330 - Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition. 331-348 - Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede:
On the Implementation of Unified Arithmetic on Binary Huff Curves. 349-364 - Ronan Lashermes, Jacques J. A. Fournier, Louis Goubin:
Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults. 365-382
Masking
- Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert:
Block Ciphers That Are Easier to Mask: How Far Can We Go? 383-399 - Vincent Grosso, François-Xavier Standaert, Sebastian Faust:
Masking vs. Multiparty Computation: How Large Is the Gap for AES? 400-416 - Arnab Roy, Srinivas Vivek:
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012. 417-434
Side-Channel Attacks and Countermeasures
- Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson:
Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA. 435-452 - Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede:
A New Model for Error-Tolerant Side-Channel Cube Attacks. 453-470 - Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. 471-488
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.