


default search action
15. CHES 2013: Santa Barbara, CA, USA
- Guido Bertoni, Jean-Sébastien Coron:

Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings. Lecture Notes in Computer Science 8086, Springer 2013, ISBN 978-3-642-40348-4
Side-Channel Attacks
- Amir Moradi

, Oliver Mischke:
On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme). 1-20 - Adrian Thillard, Emmanuel Prouff, Thomas Roche:

Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack. 21-36 - Carolyn Whitnall, Elisabeth Oswald

:
Profiling DPA: Efficacy and Efficiency Trade-Offs. 37-54 - Yasser Shoukry

, Paul D. Martin, Paulo Tabuada
, Mani B. Srivastava:
Non-invasive Spoofing Attacks for Anti-lock Braking Systems. 55-72
Physical Unclonable Function
- Roel Maes

:
An Accurate Probabilistic Reliability Model for Silicon PUFs. 73-89 - Mudit Bhargava, Ken Mai:

A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement. 90-106 - Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:

On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs. 107-125
Lightweight Cryptography
- Peter Pessl, Michael Hutter:

Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID. 126-141 - Begül Bilgin, Andrey Bogdanov

, Miroslav Knezevic, Florian Mendel
, Qingju Wang
:
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. 142-158
Hardware Implementations and Fault Attacks
- Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino:

On Measurable Side-Channel Leaks Inside ASIC Design Primitives. 159-178 - Abdelkarim Cherkaoui, Viktor Fischer, Laurent Fesquet, Alain Aubert:

A Very High Speed True Random Number Generator with Entropy Assessment. 179-196 - Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson:

Stealthy Dopant-Level Hardware Trojans. 197-214 - Subhadeep Banik

, Subhamoy Maitra:
A Differential Fault Attack on MICKEY 2.0. 215-232
Efficient and Secure Implementations
- Karim Bigou

, Arnaud Tisserand:
Improving Modular Inversion in RNS Using the Plus-Minus Method. 233-249 - Daniel J. Bernstein, Tung Chou

, Peter Schwabe:
McBits: Fast Constant-Time Code-Based Cryptography. 250-272 - Stefan Heyse, Ingo von Maurich, Tim Güneysu

:
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices. 273-292 - Ali Galip Bayrak, Francesco Regazzoni

, David Novo, Paolo Ienne:
Sleuth: Automated Verification of Software Power Analysis Countermeasures. 293-310
Elliptic Curve Cryptography
- Thomaz Oliveira, Julio López, Diego F. Aranha

, Francisco Rodríguez-Henríquez:
Lambda Coordinates for Binary Elliptic Curves. 311-330 - Joppe W. Bos, Craig Costello

, Hüseyin Hisil
, Kristin E. Lauter:
High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition. 331-348 - Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede:

On the Implementation of Unified Arithmetic on Binary Huff Curves. 349-364 - Ronan Lashermes, Jacques J. A. Fournier, Louis Goubin:

Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults. 365-382
Masking
- Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert

:
Block Ciphers That Are Easier to Mask: How Far Can We Go? 383-399 - Vincent Grosso, François-Xavier Standaert

, Sebastian Faust:
Masking vs. Multiparty Computation: How Large Is the Gap for AES? 400-416 - Arnab Roy

, Srinivas Vivek
:
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012. 417-434
Side-Channel Attacks and Countermeasures
- Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson:

Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA. 435-452 - Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede:

A New Model for Error-Tolerant Side-Channel Cube Attacks. 453-470 - Michel Abdalla

, Sonia Belaïd, Pierre-Alain Fouque
:
Leakage-Resilient Symmetric Encryption via Re-keying. 471-488

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














