default search action
11. CHES 2009: Lausanne, Switzerland
- Christophe Clavier, Kris Gaj:
Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings. Lecture Notes in Computer Science 5747, Springer 2009, ISBN 978-3-642-04137-2
Software Implementations
- Emilia Käsper, Peter Schwabe:
Faster and Timing-Attack Resistant AES-GCM. 1-17 - Mike Hamburg:
Accelerating AES with Vector Permute Instructions. 18-32 - Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang:
SSE Implementation of Multivariate PKCs on Modern x86 CPUs. 33-48 - Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, Christof Paar:
MicroEliece: McEliece for Embedded Devices. 49-64
Invited Talk 1
- Srini Devadas:
Physical Unclonable Functions and Secure Processors. 65
Side Channel Analysis of Secret Key Cryptosystems
- Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette:
Practical Electromagnetic Template Attack on HMAC. 66-80 - Emmanuel Prouff, Robert P. McEvoy:
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. 81-96 - Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon:
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. 97-111 - Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust:
Differential Cluster Analysis. 112-127
Side Channel Analysis of Public Key Cryptosystems
- Martin Hlavác:
Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. 128-140 - Thomas Finke, Max Gebhardt, Werner Schindler:
A New Side-Channel Attack on RSA Prime Generation. 141-155
Side Channel and Fault Analysis Countermeasures
- Jean-Sébastien Coron, Ilya Kizhvatov:
An Efficient Method for Random Delay Generation in Embedded Software. 156-170 - Matthieu Rivain, Emmanuel Prouff, Julien Doget:
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. 171-188 - Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh:
A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques. 189-204 - Francesco Regazzoni, Alessandro Cevrero, François-Xavier Standaert, Stéphane Badel, Theo Kluter, Philip Brisk, Yusuf Leblebici, Paolo Ienne:
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions. 205-219
Invited Talk 2
- Christof Paar:
Crypto Engineering: Some History and Some Case Studies. 220-224
Pairing-Based Cryptography
- Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez:
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers. 225-239 - Junfeng Fan, Frederik Vercauteren, Ingrid Verbauwhede:
Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves. 240-253 - David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwächter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rudolf Mathar:
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves. 254-271
New Ciphers and Efficient Implementations
- Christophe De Cannière, Orr Dunkelman, Miroslav Knezevic:
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. 272-288 - Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede:
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security. 289-303 - Nicolas Méloni, M. Anwar Hasan:
Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases. 304-316
TRNGs and Device Identification
- A. Theodore Markettos, Simon W. Moore:
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators. 317-331 - Roel Maes, Pim Tuyls, Ingrid Verbauwhede:
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. 332-347 - Ghaith Hammouri, Aykutlu Dana, Berk Sunar:
CDs Have Fingerprints Too. 348-362
Invited Talk 3
- Randy Torrance, Dick James:
The State-of-the-Art in IC Reverse Engineering. 363-381
Hot Topic Session: Hardware Trojans and Trusted ICs
- Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne P. Burleson:
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. 382-395 - Rajat Subhra Chakraborty, Francis G. Wolff, Somnath Paul, Christos A. Papachristou, Swarup Bhunia:
MERO: A Statistical Approach for Hardware Trojan Detection. 396-410
Theoretical Aspects
- Paulo Mateus, Serge Vaudenay:
On Tamper-Resistance from a Theoretical Viewpoint. 411-428 - Nicolas Veyrat-Charvillon, François-Xavier Standaert:
Mutual Information Analysis: How, When and Why?. 429-443
Fault Analysis
- Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier:
Fault Attacks on RSA Signatures with Partially Unknown Messages. 444-456 - Matthieu Rivain:
Differential Fault Analysis on DES Middle Rounds. 457-469
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.