


default search action
17. CHES 2015: Saint-Malo, France
- Tim Güneysu

, Helena Handschuh:
Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. Lecture Notes in Computer Science 9293, Springer 2015, ISBN 978-3-662-48323-7
Processing Techniques in Side-Channel Analysis
- Carolyn Whitnall, Elisabeth Oswald

:
Robust Profiling for DPA-Style Attacks. 3-21 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul

:
Less is More - Dimensionality Reduction from a Theoretical Perspective. 22-41 - Santos Merino Del Pozo

, François-Xavier Standaert
:
Blind Source Separation from Single Measurements Using Singular Spectrum Analysis. 42-59
Cryptographic Hardware Implementations
- Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki:

Highly Efficient GF(28) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design. 63-80 - Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser:

NaCl's Crypto_box in Hardware. 81-101 - Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede

:
Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates. 102-122 - Karim Bigou

, Arnaud Tisserand:
Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC. 123-140
Homomorphic Encryption in Hardware
- Thomas Pöppelmann, Michael Naehrig, Andrew Putnam

, Adrián Macías:
Accelerating Homomorphic Evaluation on Reconfigurable Hardware. 143-163 - Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren

, Vassil S. Dimitrov, Ingrid Verbauwhede
:
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation. 164-184 - Yarkin Doröz, Erdinç Öztürk, Erkay Savas, Berk Sunar:

Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware. 185-204
Side-Channel Attacks on Public Key Cryptography
- Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer

:
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. 207-228 - Werner Schindler

:
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA. 229-247 - Sarani Bhattacharya, Debdeep Mukhopadhyay:

Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms. 248-266
Cipher Design and Cryptanalysis
- Iwen Coisel, Ignacio Sánchez:

Improved Cryptanalysis of the DECT Standard Cipher. 269-286 - Aurélie Bauer, Damien Vergnaud

:
Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits. 287-306 - Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong:

The Simeck Family of Lightweight Block Ciphers. 307-329 - Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi

:
TriviA: A Fast and Secure Authenticated Encryption Scheme. 330-353
True Random Number Generators and Entropy Estimations
- Patrick Haddad, Viktor Fischer, Florent Bernard, Jean Nicolai:

A Physical Approach for Stochastic Modeling of TERO-Based TRNG. 357-372 - John Kelsey

, Kerry A. McKay
, Meltem Sönmez Turan:
Predictive Models for Min-entropy Estimation. 373-392
Side-Channel Analysis and Fault Injection Attacks
- Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:

Improved Side-Channel Analysis of Finite-Field Multiplication. 395-415 - Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert

, Dawu Gu, Sen Xu, Rong Fu:
Evaluation and Improvement of Generic-Emulating DPA Attacks. 416-432 - Yanting Ren, An Wang, Liji Wu:

Transient-Steady Effect Attack on Block Ciphers. 433-450
Higher-Order Side-Channel Attacks
- Amir Moradi

, Alexander Wild:
Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads? 453-474 - Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:

Multi-variate High-Order Attacks of Shuffled Tables Recomputation. 475-494 - Tobias Schneider, Amir Moradi

:
Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations. 495-513
Physically Unclonable Functions and Hardware Trojans
- Roel Maes

, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems:
Secure Key Generation from Biased PUFs. 517-534 - Georg T. Becker:

The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs. 535-555 - Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont

, Moti Yung:
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol. 556-576 - Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki

, Anshul, Debdeep Mukhopadhyay:
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability. 577-596
Side-Channel Attacks in Practice
- Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede

:
DPA, Bitslicing and Masking at 1 GHz. 599-619 - Jake Longo, Elke De Mulder, Dan Page, Michael Tunstall

:
SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip. 620-640 - Christian Kison, Jürgen Frinken, Christof Paar:

Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast. 641-660
Lattice-Based Implementations
- Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede

:
Efficient Ring-LWE Encryption on 8-Bit AVR Processors. 663-682 - Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren

, Ingrid Verbauwhede
:
A Masked Ring-LWE Implementation. 683-702

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














