default search action
18. CHES 2016: Santa Barbara, CA, USA
- Benedikt Gierlichs, Axel Y. Poschmann:
Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. Lecture Notes in Computer Science 9813, Springer 2016, ISBN 978-3-662-53139-6
Side Channel Analysis
- Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul:
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. 3-22 - Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. 23-39 - François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo:
Towards Easy Leakage Certification. 40-60 - Romain Poussier, François-Xavier Standaert, Vincent Grosso:
Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach. 61-81
Automotive Security
- Shalabh Jain, Jorge Guajardo:
Physical Layer Group Key Agreement for Automotive Controller Area Networks. 85-105 - Stefan Nürnberger, Christian Rossow:
- vatiCAN - Vetted, Authenticated CAN Bus. 106-124
Invasive Attacks
- Yang Xie, Ankur Srivastava:
Mitigating SAT Attack on Logic Locking. 127-146 - Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert:
No Place to Hide: Contactless Probing of Secret Data on FPGAs. 147-167
Side Channel Countermeasures I
- Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. 171-193 - Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Masking AES with d+1 Shares in Hardware. 194-212
New Directions
- Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen:
Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough. 215-236 - Andrew D. Zonenberg, Bülent Yener:
Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture. 237-256
Software Implementations
- Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez:
Software Implementation of Koblitz Curves over Quadratic Fields. 259-279 - Tung Chou:
QcBits: Constant-Time Small-Key Code-Based Cryptography. 280-300 - Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina:
\mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers. 301-320
Cache Attacks
- Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom:
Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme. 323-345 - Yuval Yarom, Daniel Genkin, Nadia Heninger:
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. 346-367 - Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Cache Attacks Enable Bulk Key Recovery on the Cloud. 368-388
Physical Unclonable Functions
- Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Strong Machine Learning Attack Against PUFs with No Mathematical Model. 391-411 - Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu:
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications. 412-431 - Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Run-Time Accessible DRAM PUFs in Commodity Devices. 432-453
Side Channel Countermeasures II
- Dahmun Goudarzi, Matthieu Rivain:
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking. 457-478 - Jürgen Pulkus, Srinivas Vivek:
Reducing the Number of Non-linear Multiplications in Masking Schemes. 479-497 - Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun:
Faster Evaluation of SBoxes via Common Shares. 498-514
Hardware Implementations
- Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa:
Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields. 517-537 - Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki:
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. 538-558 - Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner:
Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering. 559-577
Fault Attacks
- Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. 581-601 - Sarani Bhattacharya, Debdeep Mukhopadhyay:
Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis. 602-624 - Samaneh Ghandali, Georg T. Becker, Daniel E. Holcomb, Christof Paar:
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks. 625-647
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.