Cryptographic Hardware and Embedded Systems - CHES 2007

9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings

  • Editors
  • Pascal Paillier
  • Ingrid Verbauwhede
Conference proceedings CHES 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4727)

Table of contents

  1. Front Matter
  2. Differential and Higher Order Attacks

  3. Random Number Generation and Device Identification

    1. Markus Dichtl, Jovan Dj. Golić
      Pages 45-62
    2. Jorge Guajardo, Sandeep S. Kumar, Geert-Jan Schrijen, Pim Tuyls
      Pages 63-80
  4. Logic Styles: Masking and Routing

    1. Thomas Popp, Mario Kirschbaum, Thomas Zefferer, Stefan Mangard
      Pages 81-94
    2. Patrick Schaumont, Kris Tiri
      Pages 95-106
    3. Benedikt Gierlichs
      Pages 107-120
  5. Efficient Algorithms for Embedded Processors

    1. Mitsuru Matsui, Junko Nakajima
      Pages 121-134
    2. Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Özgül Küçük et al.
      Pages 148-165
  6. Collision Attacks and Fault Analysis

    1. Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovich, Timo Kasper
      Pages 166-180
    2. Alex Biryukov, Dmitry Khovratovich
      Pages 195-208
  7. High Speed AES Implementations

    1. Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert Felber, Matthias Braendli
      Pages 227-238
  8. Public-Key Cryptography

    1. Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto
      Pages 239-255
    2. Kimmo Järvinen, Juha Forsten, Jorma Skyttä
      Pages 256-271
  9. Implementation Cost of Countermeasures

    1. Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin
      Pages 289-302
    2. Stefan Tillich, Johann Großschädl
      Pages 303-319
  10. Security Issues for RF and RFID

    1. Michael Hutter, Stefan Mangard, Martin Feldhofer
      Pages 320-333
    2. O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert, J. Reverdy
      Pages 334-345
    3. Gerald DeJean, Darko Kirovski
      Pages 346-363
  11. Special Purpose Hardware for Cryptanalysis

    1. Tetsuya Izu, Jun Kogure, Takeshi Shimoyama
      Pages 364-377
    2. Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater
      Pages 378-393
    3. Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
      Pages 394-412
  12. Side Channel Analysis

    1. Bruno Robisson, Pascal Manet
      Pages 413-426
    2. François Macé, François-Xavier Standaert, Jean-Jacques Quisquater
      Pages 427-442
  13. Problems and Solutions for Lightweight Devices

    1. Christophe Clavier, Jean-Sébastien Coron
      Pages 443-449
    2. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw et al.
      Pages 450-466
    3. Pascal Paillier, Ingrid Verbauwhede
      Pages E1-E1
  14. Back Matter

About these proceedings


CHES2007,theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) and held in Vienna, Austria, September 10–13, 2007. The workshop - ceived 99 submissions from 24 countries, of which the Program Committee (39 members from 15 countries) selected 31 for presentation. For the ?rst time in the history of CHES, each submission was reviewed by at least four reviewers instead of three (and at least ?ve for submissions by PC members, those now being limited to two per member) and many submitted papers have received plenty of extra reviews (some papers received up to nine reviews), thus totalling the unprecedented record of 483 reviews overall. Thepaperscollectedinthisvolumerepresentcutting-edgeworldwideresearch in the rapidly evolving ?elds of crypto-hardware, fault-based and side-channel cryptanalysis, and embedded cryptography, at the crossing of academic and - dustrial research. The wide diversity of subjects appearing in these proceedings covers virtually all related areas and shows our e?orts to extend the scope of CHES more than usual. Although a relatively young workshop, CHES is now ?rmlyestablishedasascienti?ceventofreferenceappreciatedbymoreandmore renowned experts of theory and practice: many high-quality works were subm- ted, all of which, sadly, could not be accepted. Selecting from so many good worksis no easy task and our deepest thanks go to the members of the Program Committee for their involvement, excellence, and team spirit. We are grateful to the numerous external reviewers listed below for their expertise and assistance in our deliberations.


AES Information RSA public keys Signatur Ultra cipher implementation communication cryptanalysis cryptographic hardware cryptography network security power analysis security side-channel attacks smart car

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-74734-5
  • Online ISBN 978-3-540-74735-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software