Conference on Cryptographic Hardware and Embedded Systems 2016 (CHES 2016)
Santa Barbara, CA
Wednesday, August 17th - Friday, August 19th, 2016
Accepted Papers
- Towards Easy Leakage Certification
Authors: François Durvaux (UCL Crypto Group), François-Xavier Standaert (UCL Crypto Group), Santos
Merino Del Pozo (UCL Crypto Group)
- Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Authors: Joppe W. Bos (NXP Semiconductors), Charles Hubain (Quarkslab), Wil Michiels (NXP
Semiconductors and Technische Universiteit Eindhoven), Philippe Teuwen (Quarkslab)
- Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering
Authors: Markus Kammerstetter (TU-Wien, Secure Systems Lab Vienna), Markus Muellner (TU-Wien,
Secure Systems Lab Vienna), Christian Kudera (TU-Wien, Secure Systems Lab Vienna), Daniel Burian
(Trustworks KG), Wolfgang Kastner (TU-Wien)
- QcBits: constant-time small-key code-based cryptography
Authors: Tung Chou (Technische Universiteit Eindhoven, the Netherlands)
- Faster Evaluation of SBoxes via Common Shares
Authors: Jean-Sebastien Coron (University of Luxembourg), Aurelien Greuet (Oberthur Technologies,
France), Emmanuel Prouff (Morpho, France), Rina Zeitoun (Oberthur Technologies, France)
- CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
Authors: Yuval Yarom (The University of Adelaide and NICTA), Daniel Genkin (Technion and Tel Aviv
University), Nadia Heninger (University of Pennsylvania)
- Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
Authors: Jeroen Delvaux (KU Leuven and iMinds, Belgium, and Shanghai Jiao Tong University, China),
Dawu Gu (Shanghai Jiao Tong University, China), Ingrid Verbauwhede (KU Leuven and iMinds,
Belgium), Matthias Hiller (Technical University Munich, Germany), Meng-Day (Mandel) Yu (Verayo and
MIT, USA, and KU Leuven, Belgium)
- FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime
Characteristic Fields
Authors: Kimmo Järvinen (Aalto University, Finland), Andrea Miele (Intel Corporation, USA), Reza
Azarderakhsh (Rochester Institute of Technology, USA), Patrick Longa (Microsoft Research, USA)
- A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption
Datapaths - Toward Efficient CBC-Mode Implementation
Authors: Rei Ueno (Tohoku University), Sumio Morioka (Central Research Laboratories, NEC
Corporation), Naofumi Homma (Tohoku University), Takafumi Aoki (Tohoku University)
- Software implementation of Koblitz curves over quadratic fields
Authors: Thomaz Oliveira (CINVESTAV-IPN), Julio López (University of Campinas), Francisco
Rodríguez-Henríquez (CINVESTAV-IPN)
- Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach
Authors: Romain Poussier (UCL Crypto Group), François-Xavier Standaert (UCL Crypto Group), Vincent
Grosso (Ruhr University Bochum)
- EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
Authors: Dhiman Saha (Indian Institute of Technology Kharagpur), Dipanwita Roy Chowdhury (Indian
Institute of Technology Kharagpur)
- Masking AES with d+1 Shares in Hardware
Authors: Thomas De Cnudde (KU Leuven ESAT/COSIC and iMinds), Oscar Reparaz (KU Leuven
ESAT/COSIC and iMinds), Begül Bilgin (KU Leuven ESAT/COSIC and iMinds), Svetla Nikova (KU
Leuven ESAT/COSIC and iMinds), Ventzislav Nikov (NXP Semiconductors), Vincent Rijmen (KU Leuven
ESAT/COSIC and iMinds)
- Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
Authors: Alberto Battistello (Oberthur Technologies, France), Jean-Sebastien Coron (University of
Luxembourg), Emmanuel Prouff (Safran Identity and Security, France), and Rina Zeitoun (Oberthur
Technologies, France)
- Strong Machine Learning Attack against PUFs with No Mathematical Model
Authors: Fatemeh Ganji (Technische Universität Berlin), Shahin Tajik (Technische Universität Berlin),
Fabian Fässler (Technische Universität Berlin), Jean-Pierre Seifert (Technische Universität Berlin)
- No Place to Hide: Contactless Probing of Secret Data on FPGAs
Authors: Heiko Lohrke (Technische Universität Berlin), Shahin Tajik (Technische Universität Berlin),
Christian Boit (Technische Universität Berlin), Jean-Pierre Seifert (Technische Universität Berlin)
- Cache Attacks Enable Bulk Key Recovery on the Cloud
Authors: Mehmet Sinan Inci (Worcester Polytechnic Institute), Berk Gulmezoglu (Worcester Polytechnic
Institute), Gorka Irazoqui (Worcester Polytechnic Institute), Thomas Eisenbarth (Worcester Polytechnic
Institute), Berk Sunar (Worcester Polytechnic Institute)
- Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme
Authors: Leon Groot Bruinderink (Technische Universiteit Eindhoven), Andreas Hülsing (Technische
Universiteit Eindhoven), Tanja Lange (Technische Universiteit Eindhoven), Yuval Yarom (The University
of Adelaide and NICTA)
- Correlated Extra-Reductions Defeat Blinded Regular Exponentiation
Authors: Margaux Dugardin (Thales Communications & Security, Telecom ParisTech), Sylvain Guilley
(Telecom ParisTech, Secure-IC SAS), Jean-Luc Danger (Telecom ParisTech, Secure-IC SAS), Zakaria
Najm (ST Microelectronics), Olivier Rioul (Telecom ParisTech, Université Paris-Saclay)
- Reducing the Number of Non-linear Multiplications in Masking Schemes
Authors: Jürgen Pulkus (Giesecke & Devrient), Srinivas Vivek (University of Bristol)
- Mitigating SAT Attack on Logic Locking
Authors: Yang Xie (University of Maryland, College Park), Ankur Srivastava (University of Maryland,
College Park)
- Strong 8-bit Sboxes with Efficient Masking in Hardware
Authors: Erik Boss (Ruhr University Bochum), Vincent Grosso (Ruhr University Bochum), Tim Güneysu (University of Bremen and DFKI),
Gregor Leander (Ruhr University Bochum), Amir Moradi (Ruhr University Bochum), Tobias Schneider
(Ruhr University Bochum)
- Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis
Authors: Sarani Bhattacharya (Indian Institute of Technology Kharagpur), Debdeep Mukhopadhyay
(Indian Institute of Technology Kharagpur)
- On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
Authors: Dahmun Goudarzi (CryptoExperts, ENS, CNRS, INRIA, and PSL Research University),
Matthieu Rivain (CryptoExperts)
- Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture
Authors: Andrew D. Zonenberg (IOActive, Inc.), Bülent Yener (Rensselaer Polytechnic Institute)
- vatiCAN - Vetted, Authenticated CAN Bus
Authors: Stefan Nürnberger (DFKI GmbH, Center for IT Security, Privacy & Accountability), Christian
Rossow (Center for IT Security, Privacy & Accountability)
- Run-time Accessible DRAM PUFs in Commodity Devices
Authors: Wenjie Xiong (Yale University), André Schaller (Technische Universität Darmstadt and
CASED), Nikolaos A. Anagnostopoulos (Technische Universität Darmstadt and CASED), Muhammad
Umair Saleem (Technische Universität Darmstadt and CASED), Sebastian Gabmeyer (Technische
Universität Darmstadt and CASED), Stefan Katzenbeisser (Technische Universität Darmstadt and
CASED), Jakub Szefer (Yale University)
- Physical Layer Group Key Agreement in Automotive Controller Area Networks
Authors: Shalabh Jain (Research and Technology Center, Robert Bosch LLC), Jorge Guajardo
(Research and Technology Center, Robert Bosch LLC)
- µKummer: efficient hyperelliptic signatures and key exchange on microcontrollers
Authors: Joost Renes (Radboud University, The Netherlands), Peter Schwabe (Radboud University, The
Netherlands), Benjamin Smith (Ecole polytechnique and INRIA, France), Lejla Batina (Radboud
University, The Netherlands)
- A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
Authors: Samaneh Ghandali (ECE Department, University of Massachusetts Amherst, USA), Georg T.
Becker (Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany), Daniel Holcomb (ECE
Department, University of Massachusetts Amherst, USA, Christof Paar (ECE Department, University of
Massachusetts Amherst, USA, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany)