default search action
12. CHES 2010: Santa Barbara, CA, USA
- Stefan Mangard, François-Xavier Standaert:
Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings. Lecture Notes in Computer Science 6225, Springer 2010, ISBN 978-3-642-15030-2
Low Cost Cryptography
- Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia:
Quark: A Lightweight Hash. 1-15 - Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw:
PRINTcipher: A Block Cipher for IC-Printing. 16-32 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Sponge-Based Pseudo-Random Number Generators. 33-47
Efficient Implementations I
- Nicolas Guillermin:
A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over \mathbbFp\mathbb{F}_p. 48-64 - Raveen R. Goundar, Marc Joye, Atsuko Miyaji:
Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract). 65-79 - Patrick Longa, Catherine H. Gebotys:
Efficient Techniques for High-Speed Elliptic Curve Cryptography. 80-94
Side-Channel Attacks and Countermeasures I
- Jean-Sébastien Coron, Ilya Kizhvatov:
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. 95-109 - Onur Aciiçmez, Billy Bob Brumley, Philipp Grabher:
New Results on Instruction Cache Attacks. 110-124 - Amir Moradi, Oliver Mischke, Thomas Eisenbarth:
Correlation-Enhanced Power Analysis Collision Attack. 125-139 - Olivier Benoît, Thomas Peyrin:
Side-Channel Analysis of Six SHA-3 Candidates. 140-157
Tamper Resistance and Hardware Trojans
- Sergei Skorobogatov:
Flash Memory 'Bumping' Attacks. 158-172 - Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia:
Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection. 173-187 - Jerome Di-Battista, Jean-Christophe Courrège, Bruno Rouzeyre, Lionel Torres, Philippe Perdu:
When Failure Analysis Meets Side-Channel Attacks. 188-202
Efficient Implementations II
- Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. 203-218 - Axel Poschmann, San Ling, Huaxiong Wang:
256 Bit Standardized Crypto for 650 GE - GOST Revisited. 219-233 - Yasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa:
Mixed Bases for Efficient Inversion in \mathbb F((22)2) and Conversion Matrices of SubBytes of AES. 234-247
SHA-3
- Luca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, Frank K. Gürkaynak:
Developing a Hardware Evaluation Method for SHA-3 Candidates. 248-263 - Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski:
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs. 264-278 - Joppe W. Bos, Deian Stefan:
Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures. 279-293 - Christian Wenzel-Benner, Jens Gräf:
XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework. 294-305
Fault Attacks and Countermeasures
- Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin:
Public Key Perturbation of Randomized RSA Implementations. 306-319 - Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta:
Fault Sensitivity Analysis. 320-334
PUFs and RNGs
- Maximilian Hofer, Christoph Böhm:
An Alternative to Error Correction for SRAM-Like PUFs. 335-350 - Michal Varchola, Milos Drutarovský:
New High Entropy Element for FPGA Based True Random Number Generators. 351-365 - Daisuke Suzuki, Koichi Shimizu:
The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes. 366-382
New Designs
- Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version). 383-397 - Stéphane Badel, Nilay Dagtekin, Jorge Nakahara Jr., Khaled Ouafi, Nicolas Reffé, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay:
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware. 398-412
Side-Channel Attacks and Countermeasures II
- Matthieu Rivain, Emmanuel Prouff:
Provably Secure Higher-Order Masking of AES. 413-427 - Yossef Oren, Mario Kirschbaum, Thomas Popp, Avishai Wool:
Algebraic Side-Channel Analysis in the Presence of Errors. 428-442 - Michael Tunstall, Marc Joye:
Coordinate Blinding over Large Prime Fields. 443-455
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.