


default search action
16. CHES 2014: Busan, South Korea
- Lejla Batina, Matthew Robshaw:

Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings. Lecture Notes in Computer Science 8731, Springer 2014, ISBN 978-3-662-44708-6
Side-Channel Attacks
- Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata

, Takafumi Aoki:
EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor. 1-16 - Yossef Oren, Ofir Weisse, Avishai Wool

:
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks. 17-34 - Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard:

How to Estimate the Success Rate of Higher-Order Side-Channel Attacks. 35-54 - Annelie Heuser, Olivier Rioul, Sylvain Guilley:

Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory. 55-74
New Attacks and Constructions
- Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom

:
"Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way. 75-92 - Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay:

Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault Attacks. 93-111 - Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino:

Reversing Stealthy Dopant-Level Circuits. 112-126 - Yongqiang Li, Mingsheng Wang:

Constructing S-boxes for Lightweight Cryptography with Feistel Structure. 127-146
Countermeasures
- A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo:

A Statistical Model for Higher Order DPA on Masked Devices. 147-169 - Jean-Sébastien Coron, Arnab Roy

, Srinivas Vivek
:
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. 170-187 - Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala:

Secure Conversion between Boolean and Arithmetic Masking of Any Order. 188-205 - Gilles Barthe, François Dupressoir

, Pierre-Alain Fouque
, Benjamin Grégoire, Mehdi Tibouchi
, Jean-Christophe Zapalowicz:
Making RSA-PSS Provably Secure against Non-random Faults. 206-222
Algorithm Specific SCA
- Aurélie Bauer, Éliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche:

Side-Channel Attack against RSA Key Generation Algorithms. 223-241 - Daniel Genkin, Itamar Pipman, Eran Tromer

:
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. 242-260 - Noboru Kunihiro, Junya Honda:

RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. 261-278 - Christophe Clavier, Damien Marion, Antoine Wurcker:

Simple Power Analysis on AES Key Expansion Revisited. 279-297
ECC Implementations
- Thomas Unterluggauer, Erich Wenger:

Efficient Pairings and ECC for Embedded Systems. 298-315 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange:

Curve41417: Karatsuba Revisited. 316-334
Implementations
- Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra:

Cofactorization on Graphics Processing Units. 335-352 - Thomas Pöppelmann, Léo Ducas, Tim Güneysu

:
Enhanced Lattice-Based Signatures on Reconfigurable Hardware. 353-370 - Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens

, Donald Donglong Chen, Ingrid Verbauwhede
:
Compact Ring-LWE Cryptoprocessor. 371-391
Hardware Implementations of Symmetric Cryptosystems
- Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk

, Marcin Rogawski, Marian Srebrny, Marcin Wójcik:
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption. 392-413 - Hai Brenner, Lubos Gaspar, Gaëtan Leurent

, Alon Rosen, François-Xavier Standaert
:
FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks. 414-432 - Khoongming Khoo, Thomas Peyrin, Axel York Poschmann, Huihui Yap:

FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison. 433-450
PUFs
- Jeroen Delvaux

, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede
:
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? 451-475 - Ulrich Rührmair, Xiaolin Xu, Jan Sölter

, Ahmed Mahmoud, Mehrdad Majzoobi, Farinaz Koushanfar, Wayne P. Burleson:
Efficient Power and Timing Side Channels for Physical Unclonable Functions. 476-492 - Shahin Tajik

, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich:
Physical Characterization of Arbiter PUFs. 493-509 - Daniel E. Holcomb, Kevin Fu:

Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM. 510-526
RNGs and SCA Issues in Hardware
- Viktor Fischer, David Lubicz:

Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG. 527-543 - Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing:

Entropy Evaluation for Oscillator-Based True Random Number Generators. 544-561 - Amir Moradi

:
Side-Channel Leakage through Static Power - Should We Care about in Practice? 562-579 - Andrew J. Leiserson, Mark E. Marson, Megan A. Wachs:

Gate-Level Masking under a Path-Based Leakage Metric. 580-597 - Amir Moradi

, Vincent Immler
:
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs. 598-615

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














