What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CHES 2013
Year
Venue
Title
2013
CHES
A Differential Fault Attack on MICKEY 2.0
Subhadeep Banik
Subhamoy Maitra
2013
CHES
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
Mudit Bhargava
Ken Mai
2013
CHES
A New Model for Error-Tolerant Side-Channel Cube Attacks
Zhenqi Li
Bin Zhang
Junfeng Fan
Ingrid Verbauwhede
2013
CHES
A Very High Speed True Random Number Generator with Entropy Assessment
Abdelkarim Cherkaoui
Viktor Fischer
Laurent Fesquet
Alain Aubert
2013
CHES
An Accurate Probabilistic Reliability Model for Silicon PUFs
Roel Maes
2013
CHES
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
Arnab Roy
Srinivas Vivek
2013
CHES
Block Ciphers That Are Easier to Mask: How Far Can We Go?
Benoît Gérard
Vincent Grosso
María Naya-Plasencia
François-Xavier Standaert
2013
CHES
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings
2013
CHES
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
Begül Bilgin
Andrey Bogdanov
Miroslav Knezevic
Florian Mendel
Qingju Wang
2013
CHES
High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition
Joppe W. Bos
Craig Costello
Hüseyin Hisil
Kristin E. Lauter
2013
CHES
Improving Modular Inversion in RNS Using the Plus-Minus Method
Karim Bigou
Arnaud Tisserand
2013
CHES
Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults
Ronan Lashermes
Jacques Fournier
Louis Goubin
2013
CHES
Lambda Coordinates for Binary Elliptic Curves
★
Best Paper
Thomaz Oliveira
Julio López
Diego F. Aranha
Francisco Rodríguez-Henríquez
2013
CHES
Leakage-Resilient Symmetric Encryption via Re-keying
Michel Abdalla
Sonia Belaïd
Pierre-Alain Fouque
2013
CHES
Masking vs. Multiparty Computation: How Large Is the Gap for AES?
Vincent Grosso
François-Xavier Standaert
Sebastian Faust
2013
CHES
McBits: Fast Constant-Time Code-Based Cryptography
Daniel J. Bernstein
Tung Chou
Peter Schwabe
2013
CHES
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
Yasser Shoukry
Paul Martin
Paulo Tabuada
Mani B. Srivastava
2013
CHES
On Measurable Side-Channel Leaks Inside ASIC Design Primitives
Takeshi Sugawara
Daisuke Suzuki
Minoru Saeki
Mitsuru Shiozaki
Takeshi Fujino
2013
CHES
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs
Yossef Oren
Ahmad-Reza Sadeghi
Christian Wachsmann
2013
CHES
On the Implementation of Unified Arithmetic on Binary Huff Curves
Santosh Ghosh
Amit Kumar
Amitabh Das
Ingrid Verbauwhede
2013
CHES
On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme)
Amir Moradi
Oliver Mischke
2013
CHES
Profiling DPA: Efficacy and Efficiency Trade-Offs
Carolyn Whitnall
Elisabeth Oswald
2013
CHES
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID
Peter Pessl
Michael Hutter
2013
CHES
Sleuth: Automated Verification of Software Power Analysis Countermeasures
Ali Galip Bayrak
Francesco Regazzoni
David Novo
Paolo Ienne
2013
CHES
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
Stefan Heyse
Ingo von Maurich
Tim Güneysu
2013
CHES
Stealthy Dopant-Level Hardware Trojans
Georg T. Becker
Francesco Regazzoni
Christof Paar
Wayne P. Burleson
2013
CHES
Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
Adrian Thillard
Emmanuel Prouff
Thomas Roche
2013
CHES
The Future of SHA-3
★
Invited talk
John Kelsey
2013
CHES
Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
Elke De Mulder
Michael Hutter
Mark E. Marson
Peter Pearson