CHES 2009:
Kris Gaj and Christophe Clavier (Eds.):
Cryptographic Hardware and Embedded Systems - CHES 2009,
11th International Workshop,
Lausanne, Switzerland,
September 6-9, 2009, Proceedings
Proceedings.
CHES 2009
Lausanne, Switzerland,
September 6-9, 2009, Proceedings
Organizational Committee
Program Chairs : | Kris Gaj and Christophe Clavier | |
General Chair : | Marcelo Kaihara, EPFL, Switzerland | |
Publicity Chair : | Çetin Kaya Koç, University of California Santa Barbara, USA |
Program Committee
Lejla Batina
Daniel J. Bernstein Guido Bertoni Jean-Luc Beuchat Luca Breveglieri Ernest F. Brickell Jean-Sébastien Coron Joan Daemen Ricardo Dahab Markus Dichtl Benoit Feix Viktor Fischer Pierre-Alain Fouque Frank K. Gürkaynak Catherine H. Gebotys Christophe Giraud Louis Goubin Jorge Guajardo Peter Gutmann Helena Handschuh Naofumi Homma Joshua Jaffe Marc Joye Jens-Peter Kaps Howon Kim Cetin Kaya Koc |
Markus G. Kuhn
Soonhak Kwon Kerstin Lemke-Rust Marco Macchetti Stefan Mangard Liam Marnane Mitsuru Matsui David Naccache Dag Arne Osvik Elisabeth Oswald Christof Paar Dan Page Pascal Paillier Jean-Jacques Quisquater Francisco Rodriguez-Henriquez Pankaj Rohatgi Dipanwita RoyChowdhury Erkay Savas Patrick Schaumont Rainer Steinwandt Berk Sunar Elena Trichina Colin D. Walter Michael J. Wiener Johannes Wolkerstorfer Sung-Ming Yen |
External Referees
Software Implementations
-
Faster and Timing-Attack Resistant AES-GCM.
, 1-17,
Emilia Käsper
,
Peter Schwabe
bib info -
Accelerating AES with Vector Permute Instructions.
, 18-32,
Mike Hamburg
bib info -
SSE Implementation of Multivariate PKCs on Modern x86 CPUs.
, 33-48,
Bo-Yin Yang
,
Jintai Ding
,
Chen-Mou Cheng
,
Tien-Ren Chen
,
Ming-Shing Chen
,
Anna Inn-Tung Chen
,
Eric Li-Hsiang Kuo
,
Frost Yu-Shuang Lee
bib info -
MicroEliece: McEliece for Embedded Devices.
, 49-64,
Christof Paar
,
Thomas Eisenbarth
,
Tim Güneysu
,
Stefan Heyse
bib info
Invited Talk I
Side Channel Analysis of Secret Key Cryptosystems
-
Practical Electromagnetic Template Attack on HMAC.
, 66-80,
Pierre-Alain Fouque
,
Gaëtan Leurent
,
Frédéric Valette
,
Denis Réal
bib info -
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure.
, 81-96,
Emmanuel Prouff
,
Robert P. McEvoy
bib info -
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA.
, 97-111,
François-Xavier Standaert
,
Nicolas Veyrat-Charvillon
,
Mathieu Renauld
bib info -
Differential Cluster Analysis.
, 112-127,
Lejla Batina
,
Kerstin Lemke-Rust
,
Benedikt Gierlichs
bib info
Side Channel Analysis of Public Key Cryptosystems
-
Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication.
, 128-140,
Martin Hlavác
bib info -
A New Side-Channel Attack on RSA Prime Generation.
, 141-155,
Werner Schindler
,
Thomas Finke
,
Max Gebhardt
bib info
Side Channel and Fault Analysis Countermeasures
-
An Efficient Method for Random Delay Generation in Embedded Software.
, 156-170,
Jean-Sébastien Coron
,
Ilya Kizhvatov
bib info -
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers.
, 171-188,
Emmanuel Prouff
,
Matthieu Rivain
,
Julien Doget
bib info -
A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques.
, 189-204,
Akashi Satoh
,
Daisuke Suzuki
,
Minoru Saeki
,
Koichi Shimizu
bib info -
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions.
, 205-219,
François-Xavier Standaert
,
Francesco Regazzoni
,
Alessandro Cevrero
,
Stéphane Badel
,
Theo Kluter
,
Philip Brisk
,
Yusuf Leblebici
,
Paolo Ienne
bib info
Invited Talk 2
Pairing-Based Cryptography
-
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers.
, 225-239,
Eiji Okamoto
,
Jean-Luc Beuchat
,
Jérémie Detrey
,
Francisco Rodríguez-Henríquez
,
Nicolas Estibals
bib info -
Faster F
p
-Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves.
, 240-253,
Ingrid Verbauwhede
,
Frederik Vercauteren
,
Junfeng Fan
bib info -
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves.
, 254-271,
Peter Schwabe
,
David Kammler
,
Diandian Zhang
,
Markus Langenberg
,
Dominik Auras
,
Gerd Ascheid
,
Rudolf Mathar
,
Hanno Scharwächter
bib info
New Ciphers and Efficient Implementations
-
KATAN
and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers.
, 272-288,
Orr Dunkelman
,
Christophe De Cannière
,
Miroslav Knezevic
bib info -
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security.
, 289-303,
Ingrid Verbauwhede
,
Patrick Schaumont
,
Xu Guo
,
Junfeng Fan
bib info -
Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases.
, 304-316,
M. Anwar Hasan
,
Nicolas Meloni
bib info
TRNGs and Device Identification
-
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators.
, 317-331,
A. Theodore Markettos
,
Simon W. Moore
bib info -
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs.
, 332-347,
Pim Tuyls
,
Ingrid Verbauwhede
,
Roel Maes
bib info -
CDs Have Fingerprints Too.
, 348-362,
Berk Sunar
,
Ghaith Hammouri
,
Aykutlu Dana
bib info
Invited Talk 3
Hot Topic Session: Hardware Trojans and Trusted ICs
-
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering.
, 382-395,
Christof Paar
,
Wayne Burleson
,
Tim Güneysu
,
Lang Lin
,
Markus Kasper
bib info NULL -
MERO: A Statistical Approach for Hardware Trojan Detection.
, 396-410,
Rajat Subhra Chakraborty
,
Francis G. Wolff
,
Somnath Paul
,
Christos A. Papachristou
,
Swarup Bhunia
bib info
Theoretical Aspects
-
On Tamper-Resistance from a Theoretical Viewpoint.
, 411-428,
Serge Vaudenay
,
Paulo Mateus
bib info -
Mutual Information Analysis: How, When and Why?.
, 429-443,
François-Xavier Standaert
,
Nicolas Veyrat-Charvillon
bib info
Fault Analysis
-
Fault Attacks on RSA Signatures with Partially Unknown Messages.
, 444-456,
Jean-Sébastien Coron
,
David Naccache
,
Antoine Joux
,
Pascal Paillier
,
Ilya Kizhvatov
bib info -
Differential Fault Analysis on DES Middle Rounds.
, 457-469,
Matthieu Rivain
bib info
Author Index