CHES 2013:
Jean-Sébastien Coron and Guido Bertoni (Eds.):
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop,
Santa Barbara, CA, USA,
August 20-23, 2013
Proceedings.
CHES 2013
Organizational Committee
Program Chairs : | Jean-Sébastien Coron and Guido Bertoni | |
General Chairs : | Thomas Eisenbarth and Çetin Kaya Koç |
Program Committee
Lejla Batina |
Daniel J. Bernstein |
Alex Biryukov |
Andrey Bogdanov |
Christophe Clavier |
Junfeng Fan |
Benoit Feix |
Wieland Fischer |
Pierre-Alain Fouque |
Kris Gaj |
Tim Güneysu |
Benedikt Gierlichs |
Louis Goubin |
Johann Großschädl |
Shay Gueron |
Helena Handschuh |
Marc Joye |
Roger Khazan |
Ilya Kizhvatov |
Soonhak Kwon |
Gregor Leander |
Shiho Moriai |
David Naccache |
Christof Paar |
Dan Page |
Emmanuel Prouff |
Francesco Regazzoni |
Matthieu Rivain |
Ahmad-Reza Sadeghi |
Akashi Satoh |
Patrick Schaumont |
Daisuke Suzuki |
Yannick Teglia |
Mehdi Tibouchi |
Stefan Tillich |
Pim Tuyls |
Colin D. Walter |
Dai Yamamoto |
Bo-Yin Yang |
External Referees
- Side-channel Attacks
-
On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme)
, 1-20,
Amir Moradi
,
Oliver Mischke
bib info -
Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
, 21-36,
Emmanuel Prouff
,
Adrian Thillard
,
Thomas Roche
bib info -
Profiling DPA: Efficacy and Efficiency Trade-Offs
, 37-54,
Elisabeth Oswald
,
Carolyn Whitnall
bib info -
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
, 55-72,
Yasser Shoukry
,
Paul Martin
,
Paulo Tabuada
,
Mani B. Srivastava
bib info - Physical Unclonable Function
-
An Accurate Probabilistic Reliability Model for Silicon PUFs
, 73-89,
Roel Maes
bib info -
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
, 90-106,
Mudit Bhargava
,
Ken Mai
bib info -
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs
, 107-125,
Ahmad-Reza Sadeghi
,
Yossef Oren
,
Christian Wachsmann
bib info - Lightweight Cryptography
-
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID
, 126-141,
Michael Hutter
,
Peter Pessl
bib info -
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
, 142-158,
Florian Mendel
,
Andrey Bogdanov
,
Miroslav Knezevic
,
Begül Bilgin
,
Qingju Wang
bib info - Hardware Implementations and Fault Attacks
-
On Measurable Side-Channel Leaks Inside ASIC Design Primitives
, 159-178,
Daisuke Suzuki
,
Minoru Saeki
,
Takeshi Sugawara
,
Mitsuru Shiozaki
,
Takeshi Fujino
bib info -
A Very High Speed True Random Number Generator with Entropy Assessment
, 179-196,
Viktor Fischer
,
Abdelkarim Cherkaoui
,
Laurent Fesquet
,
Alain Aubert
bib info -
Stealthy Dopant-Level Hardware Trojans
, 197-214,
Christof Paar
,
Francesco Regazzoni
,
Georg T. Becker
,
Wayne P. Burleson
bib info -
A Differential Fault Attack on MICKEY 2.0
, 215-232,
Subhamoy Maitra
,
Subhadeep Banik
bib info - Efficient and Secure Implementations
-
Improving Modular Inversion in RNS Using the Plus-Minus Method
, 233-249,
Karim Bigou
,
Arnaud Tisserand
bib info -
McBits: Fast Constant-Time Code-Based Cryptography
, 250-272,
Daniel J. Bernstein
,
Peter Schwabe
,
Tung Chou
bib info -
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
, 273-292,
Stefan Heyse
,
Tim Güneysu
,
Ingo von Maurich
bib info -
Sleuth: Automated Verification of Software Power Analysis Countermeasures
, 293-310,
Francesco Regazzoni
,
Paolo Ienne
,
Ali Galip Bayrak
,
David Novo
bib info - Elliptic Curve Cryptography
-
Lambda Coordinates for Binary Elliptic Curves
, 311-330,
Francisco Rodríguez-Henríquez
,
Thomaz Oliveira
,
Julio López
,
Diego F. Aranha
bib info -
High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition
, 331-348,
Kristin Lauter
,
Huseyin Hisil
,
Joppe W. Bos
,
Craig Costello
bib info -
On the Implementation of Unified Arithmetic on Binary Huff Curves
, 349-364,
Ingrid Verbauwhede
,
Santosh Ghosh
,
Amit Kumar
,
Amitabh Das
bib info -
Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults
, 365-382,
Louis Goubin
,
Ronan Lashermes
,
Jacques Fournier
bib info -
Block Ciphers That Are Easier to Mask: How Far Can We Go?
, 383-399,
François-Xavier Standaert
,
María Naya-Plasencia
,
Benoît Gérard
,
Vincent Grosso
bib info -
Masking vs. Multiparty Computation: How Large Is the Gap for AES?
, 400-416,
François-Xavier Standaert
,
Sebastian Faust
,
Vincent Grosso
bib info -
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
, 417-434,
Arnab Roy
,
Srinivas Vivek
bib info - Side-channel Attacks and Countermeasures
-
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
, 435-452,
Michael Hutter
,
Elke De Mulder
,
Mark E. Marson
,
Peter Pearson
bib info -
A New Model for Error-Tolerant Side-Channel Cube Attacks
, 453-470,
Bin Zhang
,
Ingrid Verbauwhede
,
Junfeng Fan
,
Zhenqi Li
bib info -
Leakage-Resilient Symmetric Encryption via Re-keying
, 471-488,
Michel Abdalla
,
Pierre-Alain Fouque
,
Sonia Belaïd
bib info