


default search action
16. CHES 2014: Busan, South Korea
- Lejla Batina, Matthew Robshaw:
Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings. Lecture Notes in Computer Science 8731, Springer 2014, ISBN 978-3-662-44708-6
Side-Channel Attacks
- Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata
, Takafumi Aoki:
EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor. 1-16 - Yossef Oren, Ofir Weisse, Avishai Wool
:
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks. 17-34 - Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard:
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks. 35-54 - Annelie Heuser, Olivier Rioul, Sylvain Guilley:
Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory. 55-74
New Attacks and Constructions
- Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom
:
"Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way. 75-92 - Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay:
Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault Attacks. 93-111 - Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino:
Reversing Stealthy Dopant-Level Circuits. 112-126 - Yongqiang Li, Mingsheng Wang:
Constructing S-boxes for Lightweight Cryptography with Feistel Structure. 127-146
Countermeasures
- A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo:
A Statistical Model for Higher Order DPA on Masked Devices. 147-169 - Jean-Sébastien Coron, Arnab Roy
, Srinivas Vivek
:
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. 170-187 - Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala:
Secure Conversion between Boolean and Arithmetic Masking of Any Order. 188-205 - Gilles Barthe, François Dupressoir
, Pierre-Alain Fouque
, Benjamin Grégoire, Mehdi Tibouchi
, Jean-Christophe Zapalowicz:
Making RSA-PSS Provably Secure against Non-random Faults. 206-222
Algorithm Specific SCA
- Aurélie Bauer, Éliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche:
Side-Channel Attack against RSA Key Generation Algorithms. 223-241 - Daniel Genkin, Itamar Pipman, Eran Tromer
:
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. 242-260 - Noboru Kunihiro, Junya Honda:
RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. 261-278 - Christophe Clavier, Damien Marion, Antoine Wurcker:
Simple Power Analysis on AES Key Expansion Revisited. 279-297
ECC Implementations
- Thomas Unterluggauer, Erich Wenger:
Efficient Pairings and ECC for Embedded Systems. 298-315 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange:
Curve41417: Karatsuba Revisited. 316-334
Implementations
- Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra:
Cofactorization on Graphics Processing Units. 335-352 - Thomas Pöppelmann, Léo Ducas, Tim Güneysu
:
Enhanced Lattice-Based Signatures on Reconfigurable Hardware. 353-370 - Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens
, Donald Donglong Chen, Ingrid Verbauwhede
:
Compact Ring-LWE Cryptoprocessor. 371-391
Hardware Implementations of Symmetric Cryptosystems
- Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk
, Marcin Rogawski, Marian Srebrny, Marcin Wójcik:
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption. 392-413 - Hai Brenner, Lubos Gaspar, Gaëtan Leurent
, Alon Rosen, François-Xavier Standaert
:
FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks. 414-432 - Khoongming Khoo, Thomas Peyrin, Axel York Poschmann, Huihui Yap:
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison. 433-450
PUFs
- Jeroen Delvaux
, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede
:
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? 451-475 - Ulrich Rührmair, Xiaolin Xu, Jan Sölter
, Ahmed Mahmoud, Mehrdad Majzoobi, Farinaz Koushanfar, Wayne P. Burleson:
Efficient Power and Timing Side Channels for Physical Unclonable Functions. 476-492 - Shahin Tajik
, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich:
Physical Characterization of Arbiter PUFs. 493-509 - Daniel E. Holcomb, Kevin Fu:
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM. 510-526
RNGs and SCA Issues in Hardware
- Viktor Fischer, David Lubicz:
Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG. 527-543 - Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing:
Entropy Evaluation for Oscillator-Based True Random Number Generators. 544-561 - Amir Moradi
:
Side-Channel Leakage through Static Power - Should We Care about in Practice? 562-579 - Andrew J. Leiserson, Mark E. Marson, Megan A. Wachs:
Gate-Level Masking under a Path-Based Leakage Metric. 580-597 - Amir Moradi
, Vincent Immler
:
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs. 598-615

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.