


default search action
18. CHES 2016: Santa Barbara, CA, USA
- Benedikt Gierlichs, Axel Y. Poschmann:

Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. Lecture Notes in Computer Science 9813, Springer 2016, ISBN 978-3-662-53139-6
Side Channel Analysis
- Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul

:
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. 3-22 - Alberto Battistello

, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. 23-39 - François Durvaux, François-Xavier Standaert

, Santos Merino Del Pozo
:
Towards Easy Leakage Certification. 40-60 - Romain Poussier, François-Xavier Standaert

, Vincent Grosso:
Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach. 61-81
Automotive Security
- Shalabh Jain, Jorge Guajardo:

Physical Layer Group Key Agreement for Automotive Controller Area Networks. 85-105 - Stefan Nürnberger, Christian Rossow:

- vatiCAN - Vetted, Authenticated CAN Bus. 106-124
Invasive Attacks
- Yang Xie, Ankur Srivastava

:
Mitigating SAT Attack on Logic Locking. 127-146 - Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert:

No Place to Hide: Contactless Probing of Secret Data on FPGAs. 147-167
Side Channel Countermeasures I
- Erik Boss, Vincent Grosso, Tim Güneysu

, Gregor Leander
, Amir Moradi
, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. 171-193 - Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova

, Ventzislav Nikov, Vincent Rijmen
:
Masking AES with d+1 Shares in Hardware. 194-212
New Directions
- Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen:

Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough. 215-236 - Andrew D. Zonenberg

, Bülent Yener:
Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture. 237-256
Software Implementations
- Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez:

Software Implementation of Koblitz Curves over Quadratic Fields. 259-279 - Tung Chou

:
QcBits: Constant-Time Small-Key Code-Based Cryptography. 280-300 - Joost Renes

, Peter Schwabe, Benjamin Smith
, Lejla Batina:
\mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers. 301-320
Cache Attacks
- Leon Groot Bruinderink, Andreas Hülsing

, Tanja Lange, Yuval Yarom
:
Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme. 323-345 - Yuval Yarom

, Daniel Genkin, Nadia Heninger:
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. 346-367 - Mehmet Sinan Inci, Berk Gülmezoglu

, Gorka Irazoqui, Thomas Eisenbarth
, Berk Sunar:
Cache Attacks Enable Bulk Key Recovery on the Cloud. 368-388
Physical Unclonable Functions
- Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:

Strong Machine Learning Attack Against PUFs with No Mathematical Model. 391-411 - Jeroen Delvaux

, Dawu Gu, Ingrid Verbauwhede
, Matthias Hiller
, Meng-Day (Mandel) Yu:
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications. 412-431 - Wenjie Xiong

, André Schaller, Nikolaos A. Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Run-Time Accessible DRAM PUFs in Commodity Devices. 432-453
Side Channel Countermeasures II
- Dahmun Goudarzi, Matthieu Rivain:

On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking. 457-478 - Jürgen Pulkus, Srinivas Vivek

:
Reducing the Number of Non-linear Multiplications in Masking Schemes. 479-497 - Jean-Sébastien Coron, Aurélien Greuet

, Emmanuel Prouff, Rina Zeitoun:
Faster Evaluation of SBoxes via Common Shares. 498-514
Hardware Implementations
- Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa:

Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields. 517-537 - Rei Ueno, Sumio Morioka

, Naofumi Homma, Takafumi Aoki:
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. 538-558 - Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner

:
Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering. 559-577
Fault Attacks
- Dhiman Saha

, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. 581-601 - Sarani Bhattacharya, Debdeep Mukhopadhyay:

Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis. 602-624 - Samaneh Ghandali, Georg T. Becker, Daniel E. Holcomb, Christof Paar:

A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks. 625-647

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














