Cryptographic Hardware and Embedded Systems - CHES 2006

8th International Workshop, Yokohama, Japan, October 10-13, 2006. Proceedings

  • Louis Goubin
  • Mitsuru Matsui
Conference proceedings CHES 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4249)

Table of contents

  1. Front Matter
  2. Side Channels I

    1. C. Archambeau, E. Peeters, F. -X. Standaert, J. -J. Quisquater
      Pages 1-14
    2. Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar
      Pages 15-29
    3. F. -X. Standaert, E. Peeters, C. Archambeau, J. -J. Quisquater
      Pages 30-45
  3. Low Resources

    1. Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo et al.
      Pages 46-59
  4. Invited Talk I

  5. Hardware Attacks and Countermeasures I

    1. Sergei Skorobogatov
      Pages 61-75
    2. Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh
      Pages 91-100
  6. Special Purpose Hardware

    1. Sandeep Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler
      Pages 101-118
    2. Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin et al.
      Pages 119-133
  7. Efficient Algorithms for Embedded Processors

  8. Side Channels II

    1. Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume
      Pages 174-186
    2. Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh
      Pages 187-200
    3. Joseph Bonneau, Ilya Mironov
      Pages 201-215
    4. Emmanuel Prouff, Christophe Giraud, Sébastien Aumônier
      Pages 216-230
  9. Invited Talk II

  10. Hardware Attacks and Countermeasures II

    1. Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti
      Pages 232-241
  11. Efficient Hardware I

    1. Massoud Masoumi, Farshid Raissi, Mahmoud Ahmadian
      Pages 285-297
    2. Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis
      Pages 298-310
  12. Trusted Computing

  13. Side Channels III

    1. Eric Brier, Benoît Chevallier-Mames, Mathieu Ciet, Christophe Clavier
      Pages 324-338
    2. Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette
      Pages 339-353
    3. Douglas Stebila, Nicolas Thériault
      Pages 354-368
  14. Hardware Attacks and Countermeasures III

    1. Pim Tuyls, Geert-Jan Schrijen, Boris Škorić, Jan van Geloven, Nynke Verhaegh, Rob Wolters
      Pages 369-383
    2. Konrad Kulikowski, Alexander Smirnov, Alexander Taubin
      Pages 399-413
  15. Invited Talk III

    1. Ahmad-Reza Sadeghi
      Pages 414-414
  16. Efficient Hardware II

    1. K. Sakiyama, L. Batina, B. Preneel, I. Verbauwhede
      Pages 415-429
    2. Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Großschädl, Alexander Szekely, Stefan Tillich et al.
      Pages 430-444
    3. V. S. Dimitrov, K. U. Järvinen, M. J. Jacobson Jr., W. F. Chan, Z. Huang
      Pages 445-459
  17. Back Matter

About these proceedings


These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, Japan, October 10-13, 2006. The CHES workshophas been sponsored by the International Association for Cryptographic Research (IACR) since 2004. The ?rst and the second CHES workshops were held in Worcester in 1999 and 2000, respectively, followed by Paris in 2001, San Francisco Bay Area in 2002, Cologne in 2003, Boston in 2004 and Edinburgh in 2005. This is the ?rst CHES workshop held in Asia. This year,a totalof 112 paper submissionswerereceived.The reviewprocess was therefore a delicate and challenging task for the Program Committee m- bers. Each paper was carefully read by at least three reviewers, and submissions with a Program Committee member as a (co-)author by at least ?ve reviewers. The review process concluded with a two week Web discussion process which resulted in 32 papers being selected for presentation. Unfortunately, there were a number of good papers that could not be included in the program due to a lack of space. We would like to thank all the authors who submitted papers to CHES 2006. In addition to regular presentations, we were very fortunate to have in the programthreeexcellentinvitedtalksgivenbyKazumaroAoki(NTT)on“Integer Factoring Utilizing PC Cluster,” Ari Juels (RSA Labs) on “The Outer Limits of RFID Security” and Ahmad Sadeghi (Ruhr University Bochum) on “Challenges for Trusted Computing.” The program also included a rump session, chaired by Christof Paar, featuring informal presentations on recent results.


Code RFID security RSA RSA public keys Radio-Frequency Identification (RFID) Resolution Switch cipher implementation cryptanalysis cryptographic hardware embedded systems fault attacks logic network security security

Editors and affiliations

  • Louis Goubin
    • 1
  • Mitsuru Matsui
    • 2
  1. 1.Versailles Saint-Quentin-en-Yvelines UniversityVersailles CedexFrance
  2. 2.Information Technology R&D CenterMitsubishi Electric CorporationJapan

Bibliographic information

Industry Sectors
Finance, Business & Banking
IT & Software