Proceedings of CHES 2006
Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings
, Springer
- Template Attacks in Principal Subspaces., Cédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater, pp. 1-14
- PDF postscript BibTeX
- Templates vs. Stochastic Methods., Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar, pp. 15-29
- PDF postscript BibTeX
- Towards Security Limits in Side-Channel Attacks., François-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater, pp. 30-45
- PDF postscript BibTeX
- HIGHT: A New Block Cipher Suitable for Low-Resource Device., Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee, pp. 46-59
- PDF postscript BibTeX
- Integer Factoring Utilizing PC Cluster., Kazumaro Aoki, pp. 60
- PDF postscript BibTeX
- Optically Enhanced Position-Locked Power Analysis., Sergei P. Skorobogatov, pp. 61-75
- PDF postscript BibTeX
- Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations., Stefan Mangard, Kai Schramm, pp. 76-90
- PDF postscript BibTeX
- A Generalized Method of Differential Fault Attack Against AES Cryptosystem., Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, pp. 91-100
- PDF postscript BibTeX
- Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker., Sandeep Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler, pp. 101-118
- PDF postscript BibTeX
- Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware., Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi, pp. 119-133
- PDF postscript BibTeX
- Implementing Cryptographic Pairings on Smartcards., Michael Scott, Neil Costigan, Wesam Abdulwahab, pp. 134-147
- PDF postscript BibTeX
- SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form., Toru Akishita, Masanobu Katagi, Izuru Kitamura, pp. 148-159
- PDF postscript BibTeX
- Fast Generation of Prime Numbers on Portable Devices: An Update., Marc Joye, Pascal Paillier, pp. 160-173
- PDF postscript BibTeX
- A Proposition for Correlation Power Analysis Enhancement., Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume, pp. 174-186
- PDF postscript BibTeX
- High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching., Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh, pp. 187-200
- PDF postscript BibTeX
- Cache-Collision Timing Attacks Against AES., Joseph Bonneau, Ilya Mironov, pp. 201-215
- PDF postscript BibTeX
- Provably Secure S-Box Implementation Based on Fourier Transform., Emmanuel Prouff, Christophe Giraud, Sébastien Aumônier, pp. 216-230
- PDF postscript BibTeX
- The Outer Limits of RFID Security., Ari Juels, pp. 231
- PDF postscript BibTeX
- Three-Phase Dual-Rail Pre-charge Logic., Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti, pp. 232-241
- PDF postscript BibTeX
- Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage., Zhimin Chen, Yujie Zhou, pp. 242-254
- PDF postscript BibTeX
- Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style., Daisuke Suzuki, Minoru Saeki, pp. 255-269
- PDF postscript BibTeX
- Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors., Stefan Tillich, Johann Großschädl, pp. 270-284
- PDF postscript BibTeX
- NanoCMOS-Molecular Realization of Rijndael., Massoud Masoumi, Farshid Raissi, Mahmoud Ahmadian, pp. 285-297
- PDF postscript BibTeX
- Improving SHA-2 Hardware Implementations., Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis, pp. 298-310
- PDF postscript BibTeX
- Offline Hardware/Software Authentication for Reconfigurable Platforms., Eric Simpson, Patrick Schaumont, pp. 311-323
- PDF postscript BibTeX
- Why One Should Also Secure RSA Public Key Elements., Eric Brier, Benoît Chevallier-Mames, Mathieu Ciet, Christophe Clavier, pp. 324-338
- PDF postscript BibTeX
- Power Attack on Small RSA Public Exponent., Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette, pp. 339-353
- PDF postscript BibTeX
- Unified Point Addition Formulæ and Side-Channel Attacks., Douglas Stebila, Nicolas Thériault, pp. 354-368
- PDF postscript BibTeX
- Read-Proof Hardware from Protective Coatings., Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters, pp. 369-383
- PDF postscript BibTeX
- Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits., G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin, pp. 384-398
- PDF postscript BibTeX
- Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks., Konrad J. Kulikowski, Alexander Smirnov, Alexander Taubin, pp. 399-413
- PDF postscript BibTeX
- Challenges for Trusted Computing., Ahmad-Reza Sadeghi, pp. 414
- PDF postscript BibTeX
- Superscalar Coprocessor for High-Speed Curve-Based Cryptography., Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede, pp. 415-429
- PDF postscript BibTeX
- Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller., Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Großschädl, Alexander Szekely, Stefan Tillich, Johannes Wolkerstorfer, pp. 430-444
- PDF postscript BibTeX
- FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers., V. S. Dimitrov, Kimmo U. Järvinen, M. J. Jacobson, W. F. Chan, Z. Huang, pp. 445-459
- PDF postscript BibTeX
[ IACR home page ]
© IACR