CHES

IACR

IACR


Cryptographic Research Inc.

Riscure

Alphanov

eshard

newae



Airbus

ChaoLogix

Infineon

MicroSemi

NXP

Oberthur Technologies

Secure IC

Conference on Cryptographic Hardware and Embedded Systems 2016 (CHES 2016)

Santa Barbara, CA
Wednesday, August 17th - Friday, August 19th, 2016

Accepted Papers

  1. Towards Easy Leakage Certification
    Authors: François Durvaux (UCL Crypto Group), François-Xavier Standaert (UCL Crypto Group), Santos Merino Del Pozo (UCL Crypto Group)
     
  2. Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
    Authors: Joppe W. Bos (NXP Semiconductors), Charles Hubain (Quarkslab), Wil Michiels (NXP Semiconductors and Technische Universiteit Eindhoven), Philippe Teuwen (Quarkslab)
     
  3. Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering
    Authors: Markus Kammerstetter (TU-Wien, Secure Systems Lab Vienna), Markus Muellner (TU-Wien, Secure Systems Lab Vienna), Christian Kudera (TU-Wien, Secure Systems Lab Vienna), Daniel Burian (Trustworks KG), Wolfgang Kastner (TU-Wien)
     
  4. QcBits: constant-time small-key code-based cryptography
    Authors: Tung Chou (Technische Universiteit Eindhoven, the Netherlands)
     
  5. Faster Evaluation of SBoxes via Common Shares
    Authors: Jean-Sebastien Coron (University of Luxembourg), Aurelien Greuet (Oberthur Technologies, France), Emmanuel Prouff (Morpho, France), Rina Zeitoun (Oberthur Technologies, France)
     
  6. CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
    Authors: Yuval Yarom (The University of Adelaide and NICTA), Daniel Genkin (Technion and Tel Aviv University), Nadia Heninger (University of Pennsylvania)
     
  7. Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
    Authors: Jeroen Delvaux (KU Leuven and iMinds, Belgium, and Shanghai Jiao Tong University, China), Dawu Gu (Shanghai Jiao Tong University, China), Ingrid Verbauwhede (KU Leuven and iMinds, Belgium), Matthias Hiller (Technical University Munich, Germany), Meng-Day (Mandel) Yu (Verayo and MIT, USA, and KU Leuven, Belgium)
     
  8. FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields
    Authors: Kimmo Järvinen (Aalto University, Finland), Andrea Miele (Intel Corporation, USA), Reza Azarderakhsh (Rochester Institute of Technology, USA), Patrick Longa (Microsoft Research, USA)
     
  9. A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation
    Authors: Rei Ueno (Tohoku University), Sumio Morioka (Central Research Laboratories, NEC Corporation), Naofumi Homma (Tohoku University), Takafumi Aoki (Tohoku University)
     
  10. Software implementation of Koblitz curves over quadratic fields
    Authors: Thomaz Oliveira (CINVESTAV-IPN), Julio López (University of Campinas), Francisco Rodríguez-Henríquez (CINVESTAV-IPN)
     
  11. Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach
    Authors: Romain Poussier (UCL Crypto Group), François-Xavier Standaert (UCL Crypto Group), Vincent Grosso (Ruhr University Bochum)
     
  12. EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
    Authors: Dhiman Saha (Indian Institute of Technology Kharagpur), Dipanwita Roy Chowdhury (Indian Institute of Technology Kharagpur)
     
  13. Masking AES with d+1 Shares in Hardware
    Authors: Thomas De Cnudde (KU Leuven ESAT/COSIC and iMinds), Oscar Reparaz (KU Leuven ESAT/COSIC and iMinds), Begül Bilgin (KU Leuven ESAT/COSIC and iMinds), Svetla Nikova (KU Leuven ESAT/COSIC and iMinds), Ventzislav Nikov (NXP Semiconductors), Vincent Rijmen (KU Leuven ESAT/COSIC and iMinds)
     
  14. Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
    Authors: Alberto Battistello (Oberthur Technologies, France), Jean-Sebastien Coron (University of Luxembourg), Emmanuel Prouff (Safran Identity and Security, France), and Rina Zeitoun (Oberthur Technologies, France)
     
  15. Strong Machine Learning Attack against PUFs with No Mathematical Model
    Authors: Fatemeh Ganji (Technische Universität Berlin), Shahin Tajik (Technische Universität Berlin), Fabian Fässler (Technische Universität Berlin), Jean-Pierre Seifert (Technische Universität Berlin)
     
  16. No Place to Hide: Contactless Probing of Secret Data on FPGAs
    Authors: Heiko Lohrke (Technische Universität Berlin), Shahin Tajik (Technische Universität Berlin), Christian Boit (Technische Universität Berlin), Jean-Pierre Seifert (Technische Universität Berlin)
     
  17. Cache Attacks Enable Bulk Key Recovery on the Cloud
    Authors: Mehmet Sinan Inci (Worcester Polytechnic Institute), Berk Gulmezoglu (Worcester Polytechnic Institute), Gorka Irazoqui (Worcester Polytechnic Institute), Thomas Eisenbarth (Worcester Polytechnic Institute), Berk Sunar (Worcester Polytechnic Institute)
     
  18. Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme
    Authors: Leon Groot Bruinderink (Technische Universiteit Eindhoven), Andreas Hülsing (Technische Universiteit Eindhoven), Tanja Lange (Technische Universiteit Eindhoven), Yuval Yarom (The University of Adelaide and NICTA)
     
  19. Correlated Extra-Reductions Defeat Blinded Regular Exponentiation
    Authors: Margaux Dugardin (Thales Communications & Security, Telecom ParisTech), Sylvain Guilley (Telecom ParisTech, Secure-IC SAS), Jean-Luc Danger (Telecom ParisTech, Secure-IC SAS), Zakaria Najm (ST Microelectronics), Olivier Rioul (Telecom ParisTech, Université Paris-Saclay)
     
  20. Reducing the Number of Non-linear Multiplications in Masking Schemes
    Authors: Jürgen Pulkus (Giesecke & Devrient), Srinivas Vivek (University of Bristol)
     
  21. Mitigating SAT Attack on Logic Locking
    Authors: Yang Xie (University of Maryland, College Park), Ankur Srivastava (University of Maryland, College Park)
     
  22. Strong 8-bit Sboxes with Efficient Masking in Hardware
    Authors: Erik Boss (Ruhr University Bochum), Vincent Grosso (Ruhr University Bochum), Tim Güneysu (University of Bremen and DFKI), Gregor Leander (Ruhr University Bochum), Amir Moradi (Ruhr University Bochum), Tobias Schneider (Ruhr University Bochum)
     
  23. Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis
    Authors: Sarani Bhattacharya (Indian Institute of Technology Kharagpur), Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur)
     
  24. On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
    Authors: Dahmun Goudarzi (CryptoExperts, ENS, CNRS, INRIA, and PSL Research University), Matthieu Rivain (CryptoExperts)
     
  25. Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture
    Authors: Andrew D. Zonenberg (IOActive, Inc.), Bülent Yener (Rensselaer Polytechnic Institute)
     
  26. vatiCAN - Vetted, Authenticated CAN Bus
    Authors: Stefan Nürnberger (DFKI GmbH, Center for IT Security, Privacy & Accountability), Christian Rossow (Center for IT Security, Privacy & Accountability)
     
  27. Run-time Accessible DRAM PUFs in Commodity Devices
    Authors: Wenjie Xiong (Yale University), André Schaller (Technische Universität Darmstadt and CASED), Nikolaos A. Anagnostopoulos (Technische Universität Darmstadt and CASED), Muhammad Umair Saleem (Technische Universität Darmstadt and CASED), Sebastian Gabmeyer (Technische Universität Darmstadt and CASED), Stefan Katzenbeisser (Technische Universität Darmstadt and CASED), Jakub Szefer (Yale University)
     
  28. Physical Layer Group Key Agreement in Automotive Controller Area Networks
    Authors: Shalabh Jain (Research and Technology Center, Robert Bosch LLC), Jorge Guajardo (Research and Technology Center, Robert Bosch LLC)
     
  29. µKummer: efficient hyperelliptic signatures and key exchange on microcontrollers
    Authors: Joost Renes (Radboud University, The Netherlands), Peter Schwabe (Radboud University, The Netherlands), Benjamin Smith (Ecole polytechnique and INRIA, France), Lejla Batina (Radboud University, The Netherlands)
     
  30. A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
    Authors: Samaneh Ghandali (ECE Department, University of Massachusetts Amherst, USA), Georg T. Becker (Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany), Daniel Holcomb (ECE Department, University of Massachusetts Amherst, USA, Christof Paar (ECE Department, University of Massachusetts Amherst, USA, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany)