CHES 2014:
Matthew J. B. Robshaw and Lejla Batina (Eds.):
Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop
Busan, South Korea,
September 23-26, 2014
CHES 2014
Preface
by Matthew J. B. Robshaw and Lejla Batina (Eds.):
Organizational Committee
Program Committee
External Referees
Program Chairs : | Matthew J. B. Robshaw and Lejla Batina | |
General Chair : | Kwangjo Kim |
Program Committee
Onur Acıiçmez |
Daniel J. Bernstein |
Guido Bertoni |
Christophe Clavier |
Jean-Sébastien Coron |
Thomas Eisenbarth |
Junfeng Fan |
Wieland Fischer |
Pierre-Alain Fouque |
Kris Gaj |
Tim Güneysu |
Benedikt Gierlichs |
Louis Goubin |
Dong-Guk Han |
Helena Handschuh |
Michael Hutter |
Marc Joye |
Howon Kim |
Ilya Kizhvatov |
François Koeune |
Farinaz Koushanfar |
Gregor Leander |
Kerstin Lemke-Rust |
Roel Maes |
Stefan Mangard |
Marcel Medwed |
Elke De Mulder |
Christof Paar |
Dan Page |
Eric Peeters |
Axel Poschmann |
Emmanuel Prouff |
Francesco Regazzoni |
Matthieu Rivain |
Ahmad-Reza Sadeghi |
Kazuo Sakiyama |
Akashi Satoh |
Patrick Schaumont |
Peter Schwabe |
Daisuke Suzuki |
Mehdi Tibouchi |
Ingrid Verbauwhede |
Bo-Yin Yang |
External Referees
-
Side-Channel Attacks
-
EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor
, 1-16,
Naofumi Homma
,
Takafumi Aoki
,
Yu-ichi Hayashi
,
Noriyuki Miura
,
Daisuke Fujimoto
,
Daichi Tanaka
,
Makoto Nagata
bib info -
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks
, 17-34,
Avishai Wool
,
Yossef Oren
,
Ofir Weisse
bib info -
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
, 35-54,
Emmanuel Prouff
,
Matthieu Rivain
,
Adrian Thillard
,
Thomas Roche
,
Victor Lomné
bib info -
Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory
, 55-74,
Sylvain Guilley
,
Annelie Heuser
,
Olivier Rioul
bib info
-
EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor
, 1-16,
Naofumi Homma
,
Takafumi Aoki
,
Yu-ichi Hayashi
,
Noriyuki Miura
,
Daisuke Fujimoto
,
Daichi Tanaka
,
Makoto Nagata
-
New Attacks and Constructions
-
"Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way
, 75-92,
Nigel P. Smart
,
Naomi Benger
,
Joop van de Pol
,
Yuval Yarom
bib info -
Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault Attacks
, 93-111,
Debdeep Mukhopadhyay
,
Harshal Tupsamudre
,
Shikha Bisht
bib info -
Reversing Stealthy Dopant-Level Circuits
, 112-126,
Daisuke Suzuki
,
Takeshi Sugawara
,
Mitsuru Shiozaki
,
Takeshi Fujino
,
Ryohei Hori
,
Ryoichi Fujii
,
Shigeaki Tawa
bib info -
Constructing S-boxes for Lightweight Cryptography with Feistel Structure
, 127-146,
Mingsheng Wang
,
Yongqiang Li
bib info
-
"Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way
, 75-92,
Nigel P. Smart
,
Naomi Benger
,
Joop van de Pol
,
Yuval Yarom
-
Countermeasures
-
A Statistical Model for Higher Order DPA on Masked Devices
, 147-169,
Yunsi Fei
,
A. Adam Ding
,
Liwei Zhang
,
Pei Luo
bib info -
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures
, 170-187,
Jean-Sébastien Coron
,
Arnab Roy
,
Srinivas Vivek
bib info -
Secure Conversion between Boolean and Arithmetic Masking of Any Order
, 188-205,
Jean-Sébastien Coron
,
Praveen Kumar Vadnala
,
Johann Großschädl
bib info -
Making RSA-PSS Provably Secure against Non-random Faults
, 206-222,
Pierre-Alain Fouque
,
Mehdi Tibouchi
,
Gilles Barthe
,
Jean-Christophe Zapalowicz
,
François Dupressoir
,
Benjamin Grégoire
bib info
-
A Statistical Model for Higher Order DPA on Masked Devices
, 147-169,
Yunsi Fei
,
A. Adam Ding
,
Liwei Zhang
,
Pei Luo
-
Algorithm Specific SCA
-
Side-Channel Attack against RSA Key Generation Algorithms
, 223-241,
Emmanuel Prouff
,
Éliane Jaulmes
,
Aurélie Bauer
,
Thomas Roche
,
Victor Lomné
bib info -
RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
, 261-278,
Noboru Kunihiro
,
Junya Honda
bib info -
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
, 242-260,
Eran Tromer
,
Daniel Genkin
,
Itamar Pipman
bib info -
Simple Power Analysis on AES Key Expansion Revisited
, 279-297,
Christophe Clavier
,
Antoine Wurcker
,
Damien Marion
bib info
-
Side-Channel Attack against RSA Key Generation Algorithms
, 223-241,
Emmanuel Prouff
,
Éliane Jaulmes
,
Aurélie Bauer
,
Thomas Roche
,
Victor Lomné
- ECC Implementations
-
Implementations
-
Cofactorization on Graphics Processing Units
, 335-352,
Arjen K. Lenstra
,
Thorsten Kleinjung
,
Joppe W. Bos
,
Andrea Miele
bib info -
Enhanced Lattice-Based Signatures on Reconfigurable Hardware
, 353-370,
Tim Güneysu
,
Thomas Pöppelmann
,
Léo Ducas
bib info -
Compact Ring-LWE Cryptoprocessor
, 371-391,
Ingrid Verbauwhede
,
Frederik Vercauteren
,
Nele Mentens
,
Sujoy Sinha Roy
,
Donald Donglong Chen
bib info
-
Cofactorization on Graphics Processing Units
, 335-352,
Arjen K. Lenstra
,
Thorsten Kleinjung
,
Joppe W. Bos
,
Andrea Miele
-
Hardware Implementations of Symmetric Cryptosystems
-
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption
, 392-413,
Josef Pieprzyk
,
Kris Gaj
,
Krystian Matusiewicz
,
Marcin Rogawski
,
Ekawat Homsirikamol
,
Pawel Morawiecki
,
Marian Srebrny
,
Marcin Wéjcik
bib info -
FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks
, 414-432,
François-Xavier Standaert
,
Alon Rosen
,
Lubos Gaspar
,
Gaëtan Leurent
,
Hai Brenner
bib info -
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
, 433-450,
Thomas Peyrin
,
Axel Poschmann
,
Khoongming Khoo
,
Huihui Yap
bib info
-
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption
, 392-413,
Josef Pieprzyk
,
Kris Gaj
,
Krystian Matusiewicz
,
Marcin Rogawski
,
Ekawat Homsirikamol
,
Pawel Morawiecki
,
Marian Srebrny
,
Marcin Wéjcik
-
PUFs
-
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
, 451-475,
Ingrid Verbauwhede
,
Dawu Gu
,
Jeroen Delvaux
,
Dries Schellekens
bib info -
Efficient Power and Timing Side Channels for Physical Unclonable Functions
, 476-492,
Mehrdad Majzoobi
,
Farinaz Koushanfar
,
Wayne P. Burleson
,
Xiaolin Xu
,
Ulrich Rührmair
,
Jan Sölter
,
Ahmed Mahmoud
bib info -
Physical Characterization of Arbiter PUFs
, 493-509,
Jean-Pierre Seifert
,
Dmitry Nedospasov
,
Shahin Tajik
,
Enrico Dietz
,
Sven Frohmann
,
Helmar Dittrich
,
Clemens Helfmeier
,
Christian Boit
bib info -
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM
, 510-526,
Kevin Fu
,
Daniel E. Holcomb
bib info
-
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
, 451-475,
Ingrid Verbauwhede
,
Dawu Gu
,
Jeroen Delvaux
,
Dries Schellekens
-
RNGs and SCA Issues in Hardware
-
Entropy Evaluation for Oscillator-Based True Random Number Generators
, 544-561,
Zongbin Liu
,
Jiwu Jing
,
Yuan Ma
,
Jingqiang Lin
,
Tianyu Chen
,
Changwei Xu
bib info -
Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG
, 527-543,
Viktor Fischer
,
David Lubicz
bib info -
Side-Channel Leakage through Static Power - Should We Care about in Practice?
, 562-579,
Amir Moradi
bib info -
Gate-Level Masking under a Path-Based Leakage Metric
, 580-597,
Mark E. Marson
,
Andrew J. Leiserson
,
Megan A. Wachs
bib info -
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
, 598-615,
Amir Moradi
,
Vincent Immler
bib info
-
Entropy Evaluation for Oscillator-Based True Random Number Generators
, 544-561,
Zongbin Liu
,
Jiwu Jing
,
Yuan Ma
,
Jingqiang Lin
,
Tianyu Chen
,
Changwei Xu