default search action
14. CHES 2012: Leuven, Belgium
- Emmanuel Prouff, Patrick Schaumont:
Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7428, Springer 2012, ISBN 978-3-642-33026-1
Intrusive Attacks and Countermeasures
- Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf:
3D Hardware Canaries. 1-22 - Sergei Skorobogatov, Christopher Woods:
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip. 23-40 - Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert:
Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us. 41-57
Masking
- Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall:
Compiler Assisted Masking. 58-75 - Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz:
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes. 76-91 - Amir Moradi, Oliver Mischke:
How Far Should Theory Be from Practice? - Evaluation of a Countermeasure. 92-106 - Blandine Debraize:
Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking. 107-121
Improved Fault Attacks and Side Channel Analysis
- Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
A Differential Fault Attack on the Grain Family of Stream Ciphers. 122-139 - Yossef Oren, Mathieu Renauld, François-Xavier Standaert, Avishai Wool:
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model. 140-154 - Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede:
Selecting Time Samples for Multivariate DPA Attacks. 155-174 - Benoît Gérard, François-Xavier Standaert:
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting. 175-192
Leakage Resiliency and Security Analysis
- Marcel Medwed, François-Xavier Standaert, Antoine Joux:
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs. 193-212 - Sebastian Faust, Krzysztof Pietrzak, Joachim Schipper:
Practical Leakage-Resilient Symmetric Cryptography. 213-232 - Yunsi Fei, Qiasi Luo, A. Adam Ding:
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis. 233-250
Physically Unclonable Functions
- Ulrich Rührmair, Marten van Dijk:
Practical Security Analysis of PUF-Based Two-Player Protocols. 251-267 - Vincent van der Leest, Bart Preneel, Erik van der Sluis:
Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment. 268-282 - Stefan Katzenbeisser, Ünal Koçabas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann:
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. 283-301 - Roel Maes, Anthony Van Herrewege, Ingrid Verbauwhede:
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator. 302-319
Efficient Implementations
- Daniel J. Bernstein, Peter Schwabe:
NEON Crypto. 320-339 - Stefan Heyse, Tim Güneysu:
Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware. 340-355 - Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Solving Quadratic Equations with XL on Parallel Architectures. 356-373 - Peter Czypek, Stefan Heyse, Enrico Thomae:
Efficient Implementations of MQPKS on Constrained Devices. 374-389
Lightweight Cryptography
- Stéphanie Kerckhof, François Durvaux, Cédric Hocquet, David Bol, François-Xavier Standaert:
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint. 390-407 - Seiichi Matsuda, Shiho Moriai:
Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation. 408-425 - Miroslav Knezevic, Ventzislav Nikov, Peter Rombouts:
Low-Latency Encryption - Is "Lightweight = Light + Wait"? 426-446
We Still Love RSA
- Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication. 447-462 - Michael Vielhaber:
Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA. 463-475 - Santanu Sarkar, Subhamoy Maitra:
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents. 476-493
Hardware Implementations
- Chester Rebeiro, Sujoy Sinha Roy, Debdeep Mukhopadhyay:
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs. 494-511 - Norman Göttert, Thomas Feller, Michael Schneider, Johannes Buchmann, Sorin A. Huss:
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes. 512-529 - Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann:
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems. 530-547 - Jen-Wei Lee, Szu-Chi Chung, Hsie-Chia Chang, Chen-Yi Lee:
An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor. 548-564
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.