Limit search to available items
Book Cover
E-book
Author CHES 2012 (2012 : Leuven, Belgium)

Title Cryptographic hardware and embedded systems-- CHES 2012 : 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings / Emmanuel Prouff, Patrick Schaumont (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7428
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7428.
LNCS sublibrary. SL 4, Security and cryptology.
Contents 3D Hardware Canaries / Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger and Sylvain Guilley, et al. -- Breakthrough Silicon Scanning Discovers Backdoor in Military Chip / Sergei Skorobogatov and Christopher Woods -- Simple Photonic Emission Analysis of AES: Photonic Side Channel Analysis for the Rest of Us / Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic and Jean-Pierre Seifert -- Compiler Assisted Masking / Andrew Moss, Elisabeth Oswald, Dan Page and Michael Tunstall -- Threshold Implementations of All 3 x 3 and 4 x 4 S-Boxes / Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen and Georg Stütz -- How Far Should Theory Be from Practice? Evaluation of a Countermeasure / Amir Moradi and Oliver Mischke -- Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking / Blandine Debraize -- A Differential Fault Attack on the Grain Family of Stream Ciphers / Subhadeep Banik, Subhamoy Maitra and Santanu Sarkar -- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model / Yossef Oren, Mathieu Renauld, François-Xavier Standaert and Avishai Wool
Selecting Time Samples for Multivariate DPA Attacks / Oscar Reparaz, Benedikt Gierlichs and Ingrid Verbauwhede -- Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting / Benoît Gérard and François-Xavier Standaert -- Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs / Marcel Medwed, François-Xavier Standaert and Antoine Joux -- Practical Leakage-Resilient Symmetric Cryptography / Sebastian Faust, Krzysztof Pietrzak and Joachim Schipper -- A Statistical Model for DPA with Novel Algorithmic Confusion Analysis / Yunsi Fei, Qiasi Luo and A. Adam Ding -- Practical Security Analysis of PUF-Based Two-Player Protocols / Ulrich Rührmair and Marten van Dijk -- Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment / Vincent van der Leest, Bart Preneel and Erik van der Sluis -- PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon / Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi and Ingrid Verbauwhede, et al
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator / Roel Maes, Anthony Van Herrewege and Ingrid Verbauwhede -- NEON Crypto / Daniel J. Bernstein and Peter Schwabe -- Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware / Stefan Heyse and Tim Güneysu -- Solving Quadratic Equations with XL on Parallel Architectures / Chen-Mou Cheng, Tung Chou, Ruben Niederhagen and Bo-Yin Yang -- Efficient Implementations of MQPKS on Constrained Devices / Peter Czypek, Stefan Heyse and Enrico Thomae -- Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint / Stéphanie Kerckhof, François Durvaux, Cédric Hocquet, David Bol and François-Xavier Standaert -- Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation / Seiichi Matsuda and Shiho Moriai -- Low-Latency Encryption -- Is "Lightweight = Light + Wait"? / Miroslav Knežević, Ventzislav Nikov and Peter Rombouts
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication / Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi and Jean-Christophe Zapalowicz -- Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA / Michael Vielhaber -- Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents / Santanu Sarkar and Subhamoy Maitra -- Pushing the Limits of High-Speed GF(2m) Elliptic Curve Scalar Multiplication on FPGAs / Chester Rebeiro, Sujoy Sinha Roy and Debdeep Mukhopadhyay -- On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes / Norman Göttert, Thomas Feller, Michael Schneider, Johannes Buchmann and Sorin Huss -- Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems / Tim Güneysu, Vadim Lyubashevsky and Thomas Pöppelmann -- An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor / Jen-Wei Lee, Szu-Chi Chung, Hsie-Chia Chang and Chen-Yi Lee
Summary This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations
Analysis Computer science
Data protection
Data structures (Computer science)
Data encryption (Computer science)
Coding theory
Coding and Information Theory
Systems and Data Security
computerwetenschappen
computer sciences
wiskunde
mathematics
informatietheorie
information theory
algoritmen
algorithms
computeranalyse
computer analysis
gegevensstructuren
data structures
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes International conference proceedings
Bibliography Includes bibliographical references and author index
Subject Data encryption (Computer science) -- Congresses
Embedded computer systems -- Congresses
Computer networks -- Security measures -- Congresses
Computer security -- Congresses
Informatique.
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Embedded computer systems
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Prouff, Emmanuel.
Schaumont, Patrick R. (Patrick Robert)
ISBN 9783642330278
3642330274
3642330266
9783642330261
Other Titles CHES 2012