CHES 2010:
François-Xavier Standaert and Stefan Mangard (Eds.):
Cryptographic Hardware and Embedded Systems - CHES 2010,
CHES 2010,
12th International Workshop, Santa Barbara, CA, USA,
August 17-20, 2010
Proceedings.
CHES 2010
12th International Workshop, Santa Barbara, CA, USA,
August 17-20, 2010
Organizational Committee
Program Chairs : | François-Xavier Standaert and Stefan Mangard | |
General Chair : | Jean-Jacques Quisquater and Çetin Kaya Koç |
Program Committee
Lejla Batina |
Daniel J. Bernstein |
Guido Bertoni |
Jean-Luc Beuchat |
Christophe Clavier |
Jean-Sébastien Coron |
Josep Domingo-Ferrer |
Hermann Drexler |
Viktor Fischer |
Pierre-Alain Fouque |
Kris Gaj |
Louis Goubin |
Aline Gouget |
Johann GroÃschädl |
Jorge Guajardo |
Kouichi Itoh |
Marc Joye |
Çetin Kaya Koç |
François Koeune |
Soonhak Kwon |
Kerstin Lemke-Rust |
Marco Macchetti |
Mitsuru Matsui |
Máire McLoone |
Michael Neve |
Elisabeth Oswald |
Christof Paar |
Eric Peeters |
Axel Poschmann |
Emmanuel Prouff |
Pankaj Rohatgi |
Akashi Satoh |
Erkay Savas |
Patrick Schaumont |
Werner Schindler |
Sergei P. Skorobogatov |
Tsuyoshi Takagi |
Stefan Tillich |
Mathias Wagner |
Colin D. Walter |
External Referees
-
Low Cost Cryptography
-
Quark: A Lightweight Hash.
, 1-15,
Willi Meier
,
María Naya-Plasencia
,
Jean-Philippe Aumasson
,
Luca Henzen
bib info -
PRINTcipher: A Block Cipher for IC-Printing.
, 16-32,
Lars R. Knudsen
,
Gregor Leander
,
Matthew J. B. Robshaw
,
Axel Poschmann
bib info -
Sponge-Based Pseudo-Random Number Generators.
, 33-47,
Joan Daemen
,
Guido Bertoni
,
Michael Peeters
,
Gilles Van Assche
bib info
-
Quark: A Lightweight Hash.
, 1-15,
Willi Meier
,
María Naya-Plasencia
,
Jean-Philippe Aumasson
,
Luca Henzen
-
Efficient Implementations I
-
A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over
F
p
.
, 48-64,
Nicolas Guillermin
bib info -
Co-
Z
Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract).
, 65-79,
Atsuko Miyaji
,
Marc Joye
,
Raveen R. Goundar
bib info -
Efficient Techniques for High-Speed Elliptic Curve Cryptography.
, 80-94,
Catherine H. Gebotys
,
Patrick Longa
bib info
-
A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over
F
p
.
, 48-64,
Nicolas Guillermin
-
Side-Channel Attacks and Countermeasures I
-
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009.
, 95-109,
Jean-Sébastien Coron
,
Ilya Kizhvatov
bib info -
New Results on Instruction Cache Attacks.
, 110-124,
Philipp Grabher
,
Onur Aciiçmez
,
Billy Bob Brumley
bib info -
Correlation-Enhanced Power Analysis Collision Attack.
, 125-139,
Amir Moradi
,
Thomas Eisenbarth
,
Oliver Mischke
bib info -
Side-Channel Analysis of Six SHA-3 Candidates.
, 140-157,
Thomas Peyrin
,
Olivier Benoît
bib info
-
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009.
, 95-109,
Jean-Sébastien Coron
,
Ilya Kizhvatov
-
Tamper Resistance and Hardware Trojans}
-
Flash Memory 'Bumping' Attacks.
, 158-172,
Sergei Skorobogatov
bib info -
Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection.
, 173-187,
Rajat Subhra Chakraborty
,
Swarup Bhunia
,
Dongdong Du
,
Seetharam Narasimhan
bib info -
When Failure Analysis Meets Side-Channel Attacks.
, 188-202,
Lionel Torres
,
Jerome Di-Battista
,
Bruno Rouzeyre
,
Philippe Perdu
,
Jean-Christophe Courrège
bib info
-
Flash Memory 'Bumping' Attacks.
, 158-172,
Sergei Skorobogatov
-
Efficient Implementations II
-
Fast Exhaustive Search for Polynomial Systems in
F
2
.
, 203-218,
Adi Shamir
,
Bo-Yin Yang
,
Chen-Mou Cheng
,
Charles Bouillaguet
,
Hsieh-Chung Chen
,
Ruben Niederhagen
,
Tung Chou
bib info -
256 Bit Standardized Crypto for 650 GE - GOST Revisited.
, 219-233,
Huaxiong Wang
,
Axel Poschmann
,
San Ling
bib info -
Mixed Bases for Efficient Inversion in
F
((2
2
)
2
)
2
and Conversion Matrices of SubBytes of AES.
, 234-247,
Yasuyuki Nogami
,
Kenta Nekado
,
Tetsumi Toyota
,
Naoto Hongo
,
Yoshitaka Morikawa
bib info
-
Fast Exhaustive Search for Polynomial Systems in
F
2
.
, 203-218,
Adi Shamir
,
Bo-Yin Yang
,
Chen-Mou Cheng
,
Charles Bouillaguet
,
Hsieh-Chung Chen
,
Ruben Niederhagen
,
Tung Chou
-
SHA-3
-
Developing a Hardware Evaluation Method for SHA-3 Candidates.
, 248-263,
Frank K. Gürkaynak
,
Luca Henzen
,
Pietro Gendotti
,
Patrice Guillet
,
Enrico Pargaetzi
,
Martin Zoller
bib info -
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs.
, 264-278,
Kris Gaj
,
Marcin Rogawski
,
Ekawat Homsirikamol
bib info -
Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures.
, 279-293,
Joppe W. Bos
,
Deian Stefan
bib info -
XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework.
, 294-305,
Christian Wenzel-Benner
,
Jens Gräf
bib info
-
Developing a Hardware Evaluation Method for SHA-3 Candidates.
, 248-263,
Frank K. Gürkaynak
,
Luca Henzen
,
Pietro Gendotti
,
Patrice Guillet
,
Enrico Pargaetzi
,
Martin Zoller
- Fault Attacks and Countermeasures
-
PUFs and RNGs
-
An Alternative to Error Correction for SRAM-Like PUFs.
, 335-350,
Maximilian Hofer
,
Christoph Boehm
bib info -
New High Entropy Element for FPGA Based True Random Number Generators.
, 351-365,
Michal Varchola
,
Milos Drutarovsky
bib info -
The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes.
, 366-382,
Daisuke Suzuki
,
Koichi Shimizu
bib info
-
An Alternative to Error Correction for SRAM-Like PUFs.
, 335-350,
Maximilian Hofer
,
Christoph Boehm
-
New Designs
-
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
, 383-397,
Vladimir Kolesnikov
,
Ahmad-Reza Sadeghi
,
Kimmo Järvinen
,
Thomas Schneider
bib info -
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware.
, 398-412,
Serge Vaudenay
,
Khaled Ouafi
,
Pouyan Sepehrdad
,
Stéphane Badel
,
Nilay Dagtekin
,
Petr Susil
,
Jorge Nakahara
,
Nicolas Reffé
bib info
-
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
, 383-397,
Vladimir Kolesnikov
,
Ahmad-Reza Sadeghi
,
Kimmo Järvinen
,
Thomas Schneider
-
Side-Channel Attacks and Countermeasures II
-
Provably Secure Higher-Order Masking of AES.
, 413-427,
Emmanuel Prouff
,
Matthieu Rivain
bib info -
Algebraic Side-Channel Analysis in the Presence of Errors.
, 428-442,
Thomas Popp
,
Mario Kirschbaum
,
Avishai Wool
,
Yossef Oren
bib info -
Coordinate Blinding over Large Prime Fields.
, 443-455,
Marc Joye
,
Michael Tunstall
bib info
-
Provably Secure Higher-Order Masking of AES.
, 413-427,
Emmanuel Prouff
,
Matthieu Rivain