What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from CHES 2015
Year
Venue
Title
2015
CHES
A Masked Ring-LWE Implementation
Oscar Reparaz
Sujoy Sinha Roy
Frederik Vercauteren
Ingrid Verbauwhede
2015
CHES
A Physical Approach for Stochastic Modeling of TERO-Based TRNG
★
Best Paper
Patrick Haddad
Viktor Fischer
Florent Bernard
Jean Nicolai
2015
CHES
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
Thomas Pöppelmann
Michael Naehrig
Andrew Putnam
Adrián Macías
2015
CHES
Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware
Yarkin Doröz
Erdinç Öztürk
Erkay Savas
Berk Sunar
2015
CHES
Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads?
Amir Moradi
Alexander Wild
2015
CHES
Blind Source Separation from Single Measurements Using Singular Spectrum Analysis
Santos Merino Del Pozo
François-Xavier Standaert
2015
CHES
Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings
2015
CHES
DPA, Bitslicing and Masking at 1 GHz
Josep Balasch
Benedikt Gierlichs
Oscar Reparaz
Ingrid Verbauwhede
2015
CHES
Efficient Ring-LWE Encryption on 8-Bit AVR Processors
Zhe Liu
Hwajeong Seo
Sujoy Sinha Roy
Johann Großschädl
Howon Kim
Ingrid Verbauwhede
2015
CHES
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
Aydin Aysu
Ege Gulcan
Daisuke Moriyama
Patrick Schaumont
Moti Yung
2015
CHES
Evaluation and Improvement of Generic-Emulating DPA Attacks
Weijia Wang
Yu Yu
Junrong Liu
Zheng Guo
François-Xavier Standaert
Dawu Gu
Sen Xu
Rong Fu
2015
CHES
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
Werner Schindler
2015
CHES
Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast
Christian Kison
Jürgen Frinken
Christof Paar
2015
CHES
Highly Efficient GF(2<sup>8</sup>) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
Rei Ueno
Naofumi Homma
Yukihiro Sugawara
Yasuyuki Nogami
Takafumi Aoki
2015
CHES
Improved Cryptanalysis of the DECT Standard Cipher
Iwen Coisel
Ignacio Sanchez
2015
CHES
Improved Side-Channel Analysis of Finite-Field Multiplication
Sonia Belaïd
Jean-Sébastien Coron
Pierre-Alain Fouque
Benoît Gérard
Jean-Gabriel Kammerer
Emmanuel Prouff
2015
CHES
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability
Sayandeep Saha
Rajat Subhra Chakraborty
Srinivasa Shashank Nuthakki
Anshul
Debdeep Mukhopadhyay
2015
CHES
Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations
Tobias Schneider
Amir Moradi
2015
CHES
Less is More - Dimensionality Reduction from a Theoretical Perspective
Nicolas Bruneau
Sylvain Guilley
Annelie Heuser
Damien Marion
Olivier Rioul
2015
CHES
Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates
Sujoy Sinha Roy
Kimmo U. Järvinen
Ingrid Verbauwhede
2015
CHES
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation
Sujoy Sinha Roy
Kimmo U. Järvinen
Frederik Vercauteren
Vassil S. Dimitrov
Ingrid Verbauwhede
2015
CHES
Multi-variate High-Order Attacks of Shuffled Tables Recomputation
Nicolas Bruneau
Sylvain Guilley
Zakaria Najm
Yannick Teglia
2015
CHES
NaCl's Crypto_box in Hardware
Michael Hutter
Jürgen Schilling
Peter Schwabe
Wolfgang Wieser
2015
CHES
Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits
Aurélie Bauer
Damien Vergnaud
2015
CHES
Predictive Models for Min-entropy Estimation
John Kelsey
Kerry A. McKay
Meltem Sönmez Turan
2015
CHES
Robust Profiling for DPA-Style Attacks
Carolyn Whitnall
Elisabeth Oswald
2015
CHES
Secure Key Generation from Biased PUFs
Roel Maes
Vincent van der Leest
Erik van der Sluis
Frans Willems
2015
CHES
Secure protocols in a hostile world
★
Invited talk
Matthew Green
2015
CHES
Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC
Karim Bigou
Arnaud Tisserand
2015
CHES
SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip
Jake Longo Galea
Elke De Mulder
Daniel Page
Michael Tunstall
2015
CHES
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
Daniel Genkin
Lev Pachmanov
Itamar Pipman
Eran Tromer
2015
CHES
The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
Georg T. Becker
2015
CHES
The Simeck Family of Lightweight Block Ciphers
Gangqiang Yang
Bo Zhu
Valentin Suder
Mark D. Aagaard
Guang Gong
2015
CHES
Transient-Steady Effect Attack on Block Ciphers
Yanting Ren
An Wang
Liji Wu
2015
CHES
TriviA: A Fast and Secure Authenticated Encryption Scheme
Avik Chakraborti
Anupam Chattopadhyay
Muhammad Hassan
Mridul Nandi
2015
CHES
Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms
Sarani Bhattacharya
Debdeep Mukhopadhyay