Cryptographic Hardware and Embedded Systems – CHES 2017

19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings

  • Wieland Fischer
  • Naofumi Homma
Conference proceedings CHES 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10529)

Also part of the Security and Cryptology book sub series (LNSC, volume 10529)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Side Channel Analysis I

    1. Front Matter
      Pages 1-1
    2. Mélissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson
      Pages 3-23
    3. Eleonora Cagli, Cécile Dumas, Emmanuel Prouff
      Pages 45-68
    4. Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
      Pages 69-90
  3. Higher Order Countermeasures

  4. Emerging Attacks I

    1. Front Matter
      Pages 173-173
    2. Stéphanie Anceau, Pierre Bleuet, Jessy Clédière, Laurent Maingault, Jean-luc Rainard, Rémi Tucoulou
      Pages 175-188
    3. Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte
      Pages 189-210
  5. Post Quantum Implementations

    1. Front Matter
      Pages 211-211
    2. Tung Chou
      Pages 213-231
    3. Andreas Hülsing, Joost Rijneveld, John Schanck, Peter Schwabe
      Pages 232-252
    4. Wen Wang, Jakub Szefer, Ruben Niederhagen
      Pages 253-274
  6. Cipher and Protocol Design

    1. Front Matter
      Pages 275-275
    2. Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi
      Pages 277-298
    3. Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz et al.
      Pages 299-320
    4. Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
      Pages 321-345
  7. Security Evaluation

    1. Front Matter
      Pages 365-365
    2. Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
      Pages 387-399
  8. FPGA Security

    1. Front Matter
      Pages 401-401
    2. Vincent Immler, Robert Specht, Florian Unterstein
      Pages 403-424
    3. Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl
      Pages 425-442
  9. Emerging Attacks II

    1. Front Matter
      Pages 443-443
    2. Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
      Pages 468-489
    3. Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun
      Pages 490-509
  10. Side Channel Analysis II

    1. Front Matter
      Pages 511-511
    2. Robert Primas, Peter Pessl, Stefan Mangard
      Pages 513-533
    3. Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert
      Pages 534-554
    4. Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange et al.
      Pages 555-576
  11. Encoding Techniques

    1. Front Matter
      Pages 577-577
    2. Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
      Pages 579-600
    3. Matthias Hiller, Aysun Gurur Önalan
      Pages 601-619
  12. Efficient Implementations

    1. Front Matter
      Pages 621-621
    2. Anthony Journault, François-Xavier Standaert
      Pages 623-643
    3. Tiago B. S. Reis, Diego F. Aranha, Julio López
      Pages 644-664
    4. Zhe Liu, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo
      Pages 665-686
    5. Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich
      Pages 687-707
  13. Back Matter
    Pages 709-710

About these proceedings


This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017.
The 33 full papers presented in this volume were carefully reviewed and selected from 130 submissions. 

The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.


data security cryptography embedded systems side channel attack authentication side-channel public key cryptography computer architecture encryption cryptographic hardware emerging attacks higher order countermeasures post quantum implementations security evaluation FPGA security encoding techniques

Editors and affiliations

  • Wieland Fischer
    • 1
  • Naofumi Homma
    • 2
  1. 1.Infineon TechnologiesNeubibergGermany
  2. 2.Tohoku UniversitySendai-shiJapan

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-66786-7
  • Online ISBN 978-3-319-66787-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Consumer Packaged Goods
Materials & Steel
Finance, Business & Banking
Energy, Utilities & Environment
Oil, Gas & Geosciences