default search action
17. CHES 2015: Saint-Malo, France
- Tim Güneysu, Helena Handschuh:
Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. Lecture Notes in Computer Science 9293, Springer 2015, ISBN 978-3-662-48323-7
Processing Techniques in Side-Channel Analysis
- Carolyn Whitnall, Elisabeth Oswald:
Robust Profiling for DPA-Style Attacks. 3-21 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul:
Less is More - Dimensionality Reduction from a Theoretical Perspective. 22-41 - Santos Merino Del Pozo, François-Xavier Standaert:
Blind Source Separation from Single Measurements Using Singular Spectrum Analysis. 42-59
Cryptographic Hardware Implementations
- Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki:
Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design. 63-80 - Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser:
NaCl's Crypto_box in Hardware. 81-101 - Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede:
Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates. 102-122 - Karim Bigou, Arnaud Tisserand:
Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC. 123-140
Homomorphic Encryption in Hardware
- Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrián Macías:
Accelerating Homomorphic Evaluation on Reconfigurable Hardware. 143-163 - Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede:
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation. 164-184 - Yarkin Doröz, Erdinç Öztürk, Erkay Savas, Berk Sunar:
Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware. 185-204
Side-Channel Attacks on Public Key Cryptography
- Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. 207-228 - Werner Schindler:
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA. 229-247 - Sarani Bhattacharya, Debdeep Mukhopadhyay:
Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms. 248-266
Cipher Design and Cryptanalysis
- Iwen Coisel, Ignacio Sanchez:
Improved Cryptanalysis of the DECT Standard Cipher. 269-286 - Aurélie Bauer, Damien Vergnaud:
Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits. 287-306 - Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong:
The Simeck Family of Lightweight Block Ciphers. 307-329 - Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi:
TriviA: A Fast and Secure Authenticated Encryption Scheme. 330-353
True Random Number Generators and Entropy Estimations
- Patrick Haddad, Viktor Fischer, Florent Bernard, Jean Nicolai:
A Physical Approach for Stochastic Modeling of TERO-Based TRNG. 357-372 - John Kelsey, Kerry A. McKay, Meltem Sönmez Turan:
Predictive Models for Min-entropy Estimation. 373-392
Side-Channel Analysis and Fault Injection Attacks
- Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. 395-415 - Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu:
Evaluation and Improvement of Generic-Emulating DPA Attacks. 416-432 - Yanting Ren, An Wang, Liji Wu:
Transient-Steady Effect Attack on Block Ciphers. 433-450
Higher-Order Side-Channel Attacks
- Amir Moradi, Alexander Wild:
Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads? 453-474 - Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multi-variate High-Order Attacks of Shuffled Tables Recomputation. 475-494 - Tobias Schneider, Amir Moradi:
Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations. 495-513
Physically Unclonable Functions and Hardware Trojans
- Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems:
Secure Key Generation from Biased PUFs. 517-534 - Georg T. Becker:
The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs. 535-555 - Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung:
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol. 556-576 - Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay:
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability. 577-596
Side-Channel Attacks in Practice
- Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede:
DPA, Bitslicing and Masking at 1 GHz. 599-619 - Jake Longo, Elke De Mulder, Dan Page, Michael Tunstall:
SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip. 620-640 - Christian Kison, Jürgen Frinken, Christof Paar:
Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast. 641-660
Lattice-Based Implementations
- Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede:
Efficient Ring-LWE Encryption on 8-Bit AVR Processors. 663-682 - Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede:
A Masked Ring-LWE Implementation. 683-702
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.