Table of contents

  1. Front Matter
  2. Intrusive Attacks and Countermeasures

    1. Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan et al.
      Pages 1-22
    2. Sergei Skorobogatov, Christopher Woods
      Pages 23-40
    3. Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert
      Pages 41-57
  3. Masking

    1. Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall
      Pages 58-75
    2. Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz
      Pages 76-91
    3. Amir Moradi, Oliver Mischke
      Pages 92-106
  4. Improved Fault Attacks and Side Channel Analysis

    1. Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
      Pages 122-139
    2. Yossef Oren, Mathieu Renauld, François-Xavier Standaert, Avishai Wool
      Pages 140-154
    3. Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
      Pages 155-174
  5. Leakage Resiliency and Security Analysis

    1. Marcel Medwed, François-Xavier Standaert, Antoine Joux
      Pages 193-212
    2. Sebastian Faust, Krzysztof Pietrzak, Joachim Schipper
      Pages 213-232
    3. Yunsi Fei, Qiasi Luo, A. Adam Ding
      Pages 233-250
  6. Physically Unclonable Functions

    1. Ulrich Rührmair, Marten van Dijk
      Pages 251-267
    2. Vincent van der Leest, Bart Preneel, Erik van der Sluis
      Pages 268-282
    3. Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
      Pages 283-301
    4. Roel Maes, Anthony Van Herrewege, Ingrid Verbauwhede
      Pages 302-319
  7. Efficient Implementations

    1. Daniel J. Bernstein, Peter Schwabe
      Pages 320-339
    2. Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
      Pages 356-373
    3. Peter Czypek, Stefan Heyse, Enrico Thomae
      Pages 374-389
  8. Lightweight Cryptography

    1. Stéphanie Kerckhof, François Durvaux, Cédric Hocquet, David Bol, François-Xavier Standaert
      Pages 390-407
    2. Miroslav Knežević, Ventzislav Nikov, Peter Rombouts
      Pages 426-446
  9. We Still Love RSA

    1. Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz
      Pages 447-462
  10. Hardware Implementations

    1. Chester Rebeiro, Sujoy Sinha Roy, Debdeep Mukhopadhyay
      Pages 494-511
    2. Norman Göttert, Thomas Feller, Michael Schneider, Johannes Buchmann, Sorin Huss
      Pages 512-529
    3. Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann
      Pages 530-547
  11. Back Matter

About these proceedings


This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.


cloud security elliptic curve cryptography post-quantum cryptography smartphones tablets

Editors and affiliations

  • Emmanuel Prouff
    • 1
  • Patrick Schaumont
    • 2
  1. 1.French Network and Information Security Agency (FNISA)ParisFrance
  2. 2.The Bradley Department of Electrical and Computer EngineeringVirginia Polytechnic InstituteBlacksburgUSA

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-33026-1
  • Online ISBN 978-3-642-33027-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software