CHES 2015:
Helena Handschuh and Tim Güneysu (Eds.):
Cryptographic Hardware and Embedded Systems - CHES 2015
17th International Workshop
Saint-Malo, France,
September 13-16, 2015
Proceedings.
CHES 2015
Organizational Committee
Program Chairs : | Helena Handschuh and Tim Güneysu | |
General Chair : | Emmanuel Prouff, Guénaël Renault and Matthieu Rivain |
Program Committee
Onur Aciiçmez |
Lejla Batina |
Daniel J. Bernstein |
Guido Bertoni |
Chen-Mou Cheng |
Jean-Sébastien Coron |
Thomas Eisenbarth |
Junfeng Fan |
Wieland Fischer |
Pierre-Alain Fouque |
Kris Gaj |
Benedikt Gierlichs |
Louis Goubin |
Naofumi Homma |
Michael Hutter |
Marc Joye |
Ilya Kizhvatov |
François Koeune |
Kerstin Lemke-Rust |
Roel Maes |
Marcel Medwed |
Amir Moradi |
Elke De Mulder |
Christof Paar |
Dan Page |
Eric Peeters |
Axel Poschmann |
Bart Preneel |
Emmanuel Prouff |
Ulrich Rührmair |
Francesco Regazzoni |
Matthew J. B. Robshaw |
Akashi Satoh |
Patrick Schaumont |
Peter Schwabe |
Daisuke Suzuki |
Mehdi Tibouchi |
Michael Tunstall |
Meng-Day (Mandel) Yu |
External Referees
- Processing Techniques in Side-Channel Analysis
-
Robust
Profiling for DPA-Style Attacks
, 3-21,
Elisabeth Oswald
,
Carolyn Whitnall
bib info -
Less is More - Dimensionality Reduction from a Theoretical Perspective
, 22-41,
Sylvain Guilley
,
Annelie Heuser
,
Olivier Rioul
,
Nicolas Bruneau
,
Damien Marion
bib info -
Blind Source Separation from Single Measurements Using Singular Spectrum Analysis
, 42-59,
François-Xavier Standaert
,
Santos Merino Del Pozo
bib info - Cryptographic Hardware Implementations
-
Highly Efficient GF(2
8
) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
, 63-80,
Naofumi Homma
,
Takafumi Aoki
,
Yasuyuki Nogami
,
Rei Ueno
,
Yukihiro Sugawara
bib info -
Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates
, 102-122,
Ingrid Verbauwhede
,
Kimmo U. Järvinen
,
Sujoy Sinha Roy
bib info -
Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC
, 123-140,
Karim Bigou
,
Arnaud Tisserand
bib info - Homomorphic Encryption in Hardware
-
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
, 143-163,
Michael Naehrig
,
Thomas Pöppelmann
,
Andrew Putnam
,
Adrián Macías
bib info -
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation
, 164-184,
Vassil S. Dimitrov
,
Ingrid Verbauwhede
,
Kimmo U. Järvinen
,
Frederik Vercauteren
,
Sujoy Sinha Roy
bib info -
Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware
, 185-204,
Erkay Savas
,
Berk Sunar
,
Yarkin Doröz
,
Erdinç Öztürk
bib info - Side-Channel Attacks on Public Key Cryptography
-
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
, 207-228,
Eran Tromer
,
Daniel Genkin
,
Lev Pachmanov
,
Itamar Pipman
bib info -
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
, 229-247,
Werner Schindler
bib info -
Who Watches the Watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
,
Sarani Bhattacharya
and
Debdeep Mukhopadhyay
bib info -
Cipher Design and Cryptanalysis
-
Improved Cryptanalysis of the DECT Standard Cipher
, 269-286,
Iwen Coisel
,
Ignacio Sanchez
bib info -
Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits
, 287-306,
Damien Vergnaud
,
Aurélie Bauer
bib info -
The Simeck Family of Lightweight Block Ciphers
, 307-329,
Guang Gong
,
Bo Zhu
,
Valentin Suder
,
Gangqiang Yang
,
Mark D. Aagaard
bib info -
TriviA: A Fast and Secure Authenticated Encryption Scheme
, 330-353,
Mridul Nandi
,
Avik Chakraborti
,
Anupam Chattopadhyay
,
Muhammad Hassan
bib info
-
Improved Cryptanalysis of the DECT Standard Cipher
, 269-286,
Iwen Coisel
,
Ignacio Sanchez
- True Random Number Generators and Entropy Estimations
-
A Physical Approach for Stochastic Modeling of TERO-Based TRNG
, 357-372,
Viktor Fischer
,
Patrick Haddad
,
Florent Bernard
,
Jean Nicolai
bib info -
Predictive Models for Min-entropy Estimation
, 373-392,
John Kelsey
,
Kerry A. McKay
,
Meltem Sönmez Turan
bib info -
Improved Side-Channel Analysis of Finite-Field Multiplication
, 395-415,
Jean-Sébastien Coron
,
Pierre-Alain Fouque
,
Emmanuel Prouff
,
Benoît Gérard
,
Jean-Gabriel Kammerer
,
Sonia Belaïd
bib info -
Evaluation and Improvement of Generic-Emulating DPA Attacks
, 416-432,
François-Xavier Standaert
,
Dawu Gu
,
Yu Yu
,
Weijia Wang
,
Junrong Liu
,
Zheng Guo
,
Sen Xu
,
Rong Fu
bib info -
Transient-Steady Effect Attack on Block Ciphers
, 433-450,
Liji Wu
,
An Wang
,
Yanting Ren
bib info - Higher-Order Side-Channel Attacks
-
Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads?
, 453-474,
Amir Moradi
,
Alexander Wild
bib info -
Multi-variate High-Order Attacks of Shuffled Tables Recomputation
, 475-494,
Sylvain Guilley
,
Yannick Teglia
,
Zakaria Najm
,
Nicolas Bruneau
bib info -
Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations
, 495-513,
Amir Moradi
,
Tobias Schneider
bib info - Physically Unclonable Functions and Hardware Trojans
-
Secure Key Generation from Biased PUFs
, 517-534,
Roel Maes
,
Vincent van der Leest
,
Erik van der Sluis
,
Frans Willems
bib info -
The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
, 535-555,
Georg T. Becker
bib info -
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
, 556-576,
Moti Yung
,
Patrick Schaumont
,
Aydin Aysu
,
Ege Gulcan
,
Daisuke Moriyama
bib info -
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability
, 577-596,
Debdeep Mukhopadhyay
,
Rajat Subhra Chakraborty
,
Sayandeep Saha
,
Srinivasa Shashank Nuthakki
,
Anshul
bib info - Side-Channel Attacks in Practice
-
DPA, Bitslicing and Masking at 1 GHz
, 599-619,
Ingrid Verbauwhede
,
Benedikt Gierlichs
,
Oscar Reparaz
,
Josep Balasch
bib info -
SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip
, 620-640,
Dan Page
,
Michael Tunstall
,
Elke De Mulder
,
Jake Longo Galea
bib info -
Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast
, 641-660,
Christof Paar
,
Christian Kison
,
Jürgen Frinken
bib info - Lattice-Based Implementations