CHES 2012:
Patrick Schaumont and Emmanuel Prouff (Eds.):
Cryptographic Hardware and Embedded Systems - 14th International Workshop - CHES 2012,
Leuven, Belgium
September 9-12, 2012
Proceedings.
CHES 2012
Leuven, Belgium,
September 9-12, 2012
Organizational Committee
Program Chairs : | Patrick Schaumont and Emmanuel Prouff |
Program Committee
Paulo S. L. M. Barreto |
Daniel J. Bernstein |
Guido Bertoni |
Swarup Bhunia |
Zhimin Chen |
Dipanwita Roy Chowdhury |
Jean-Sébastien Coron |
Ricardo Dahab |
H Drexler |
Thomas Eisenbarth |
Kris Gaj |
Catherine H. Gebotys |
Benedikt Gierlichs |
Christophe Giraud |
Louis Goubin |
T Gueneysu |
Sylvain Guilley |
Naofumi Homma |
Marc Joye |
Kerstin Lemke-Rust |
Yiorgos Makris |
Stefan Mangard |
Mitsuru Matsui |
Ivan Damgård |
Elisabeth Oswald |
Olivier Pereira |
Krzysztof Pietrzak |
Axel Poschmann |
Nachiketh R. Potlapally |
Leonid Reyzin |
Matthieu Rivain |
Matthew J. B. Robshaw |
Thomas Roche |
Pankaj Rohatgi |
Akashi Satoh |
Erkay Savas |
Jörn-Marc Schmidt |
Sergei P. Skorobogatov |
Nigel P. Smart |
Sarah Zakarias |
Nicolas Veyrat-Charvillon |
Colin D. Walter |
Dai Watanabe |
Dai Yamamoto |
External Referees
-
Intrusive Attacks and Countermeasures
-
3D Hardware Canaries
, 1-22,
David Naccache
,
Sylvain Guilley
,
Sébastien Briais
,
Stéphane Caron
,
Jean-Michel Cioranesco
,
Jean-Luc Danger
,
Jacques-Henri Jourdan
,
Arthur Milchior
,
Thibault Porteboeuf
bib info -
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
, 23-40,
Sergei Skorobogatov
,
Christopher Woods
bib info -
Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us
, 41-57,
Jean-Pierre Seifert
,
Alexander Schlösser
,
Dmitry Nedospasov
,
Juliane Krämer
,
Susanna Orlic
bib info
-
3D Hardware Canaries
, 1-22,
David Naccache
,
Sylvain Guilley
,
Sébastien Briais
,
Stéphane Caron
,
Jean-Michel Cioranesco
,
Jean-Luc Danger
,
Jacques-Henri Jourdan
,
Arthur Milchior
,
Thibault Porteboeuf
-
Masking
-
Compiler Assisted Masking
, 58-75,
Elisabeth Oswald
,
Dan Page
,
Michael Tunstall
,
Andrew Moss
bib info -
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
, 76-91,
Vincent Rijmen
,
Ventzislav Nikov
,
Svetla Nikova
,
Begül Bilgin
,
Georg Stütz
bib info -
How Far Should Theory Be from Practice? - Evaluation of a Countermeasure
, 92-106,
Amir Moradi
,
Oliver Mischke
bib info -
Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking
, 107-121,
Blandine Debraize
bib info
-
Compiler Assisted Masking
, 58-75,
Elisabeth Oswald
,
Dan Page
,
Michael Tunstall
,
Andrew Moss
-
Improved Fault Attacks and Side Channel Analysis
-
A Differential Fault Attack on the Grain Family of Stream Ciphers
, 122-139,
Subhamoy Maitra
,
Santanu Sarkar
,
Subhadeep Banik
bib info -
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
, 140-154,
François-Xavier Standaert
,
Avishai Wool
,
Mathieu Renauld
,
Yossef Oren
bib info -
Selecting Time Samples for Multivariate DPA Attacks
, 155-174,
Ingrid Verbauwhede
,
Benedikt Gierlichs
,
Oscar Reparaz
bib info -
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting
, 175-192,
François-Xavier Standaert
,
Benoît Gérard
bib info
-
A Differential Fault Attack on the Grain Family of Stream Ciphers
, 122-139,
Subhamoy Maitra
,
Santanu Sarkar
,
Subhadeep Banik
-
Leakage Resiliency and Security Analysis
-
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
, 193-212,
Antoine Joux
,
François-Xavier Standaert
,
Marcel Medwed
bib info -
Practical Leakage-Resilient Symmetric Cryptography
, 213-232,
Krzysztof Pietrzak
,
Sebastian Faust
,
Joachim Schipper
bib info -
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
, 233-250,
Yunsi Fei
,
Qiasi Luo
,
A. Adam Ding
bib info
-
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
, 193-212,
Antoine Joux
,
François-Xavier Standaert
,
Marcel Medwed
-
Physically Unclonable Functions
-
Practical Security Analysis of PUF-Based Two-Player Protocols
, 251-267,
Marten van Dijk
,
Ulrich Rührmair
bib info -
Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment
, 268-282,
Bart Preneel
,
Vincent van der Leest
,
Erik van der Sluis
bib info -
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
, 283-301,
Ahmad-Reza Sadeghi
,
Ingrid Verbauwhede
,
Stefan Katzenbeisser
,
Christian Wachsmann
,
Ünal Koçabas
,
Vladimir Rozic
bib info -
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
, 302-319,
Ingrid Verbauwhede
,
Roel Maes
,
Anthony Van Herrewege
bib info
-
Practical Security Analysis of PUF-Based Two-Player Protocols
, 251-267,
Marten van Dijk
,
Ulrich Rührmair
-
Efficient Implementations
-
NEON Crypto
, 320-339,
Daniel J. Bernstein
,
Peter Schwabe
bib info -
Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware
, 340-355,
Stefan Heyse
,
Tim Güneysu
bib info -
Solving Quadratic Equations with XL on Parallel Architectures
, 356-373,
Bo-Yin Yang
,
Chen-Mou Cheng
,
Ruben Niederhagen
,
Tung Chou
bib info -
Efficient Implementations of MQPKS on Constrained Devices
, 374-389,
Stefan Heyse
,
Enrico Thomae
,
Peter Czypek
bib info
-
NEON Crypto
, 320-339,
Daniel J. Bernstein
,
Peter Schwabe
-
Lightweight Cryptography
-
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
, 390-407,
François-Xavier Standaert
,
Stéphanie Kerckhof
,
François Durvaux
,
Cédric Hocquet
,
David Bol
bib info -
Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation
, 408-425,
Shiho Moriai
,
Seiichi Matsuda
bib info -
Low-Latency Encryption - Is "Lightweight = Light + Wait"?
, 426-446,
Ventzislav Nikov
,
Miroslav Knezevic
,
Peter Rombouts
bib info
-
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
, 390-407,
François-Xavier Standaert
,
Stéphanie Kerckhof
,
François Durvaux
,
Cédric Hocquet
,
David Bol
-
We still love RSA
-
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
, 447-462,
Pierre-Alain Fouque
,
Mehdi Tibouchi
,
Nicolas Guillermin
,
Delphine Leresteux
,
Jean-Christophe Zapalowicz
bib info -
Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA
, 463-475,
Michael Vielhaber
bib info -
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
, 476-493,
Subhamoy Maitra
,
Santanu Sarkar
bib info
-
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
, 447-462,
Pierre-Alain Fouque
,
Mehdi Tibouchi
,
Nicolas Guillermin
,
Delphine Leresteux
,
Jean-Christophe Zapalowicz
-
Hardware Implementations
-
Pushing the Limits of High-Speed GF(2
m
) Elliptic Curve Scalar Multiplication on FPGAs
, 494-511,
Debdeep Mukhopadhyay
,
Chester Rebeiro
,
Sujoy Sinha Roy
bib info -
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
, 512-529,
Johannes Buchmann
,
Michael Schneider 0002
,
Norman Göttert
,
Thomas Feller
,
Sorin A. Huss
bib info -
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
, 530-547,
Vadim Lyubashevsky
,
Tim Güneysu
,
Thomas Pöppelmann
bib info -
An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor
, 548-564,
Jen-Wei Lee
,
Szu-Chi Chung
,
Hsie-Chia Chang
,
Chen-Yi Lee
bib info
-
Pushing the Limits of High-Speed GF(2
m
) Elliptic Curve Scalar Multiplication on FPGAs
, 494-511,
Debdeep Mukhopadhyay
,
Chester Rebeiro
,
Sujoy Sinha Roy