Cryptographic Hardware and Embedded Systems – CHES 2016

18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings

  • Benedikt Gierlichs
  • Axel Y. Poschmann
Conference proceedings CHES 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9813)

Also part of the Security and Cryptology book sub series (LNSC, volume 9813)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Side Channel Analysis

    1. Front Matter
      Pages 1-1
    2. Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul
      Pages 3-22
    3. Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun
      Pages 23-39
    4. François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo
      Pages 40-60
    5. Romain Poussier, François-Xavier Standaert, Vincent Grosso
      Pages 61-81
  3. Automotive Security

    1. Front Matter
      Pages 83-83
    2. Stefan Nürnberger, Christian Rossow
      Pages 106-124
  4. Invasive Attacks

    1. Front Matter
      Pages 125-125
    2. Yang Xie, Ankur Srivastava
      Pages 127-146
    3. Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert
      Pages 147-167
  5. Side Channel Countermeasures I

    1. Front Matter
      Pages 169-169
    2. Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
      Pages 171-193
    3. Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
      Pages 194-212
  6. New Directions

    1. Front Matter
      Pages 213-213
    2. Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
      Pages 215-236
  7. Software Implementations

    1. Front Matter
      Pages 257-257
    2. Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez
      Pages 259-279
    3. Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina
      Pages 301-320
  8. Cache Attacks

    1. Front Matter
      Pages 321-321
    2. Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom
      Pages 323-345
    3. Yuval Yarom, Daniel Genkin, Nadia Heninger
      Pages 346-367
    4. Mehmet Sinan İnci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
      Pages 368-388
  9. Physical Unclonable Functions

    1. Front Matter
      Pages 389-389
    2. Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert
      Pages 391-411
    3. Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu
      Pages 412-431
    4. Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser et al.
      Pages 432-453
  10. Side Channel Countermeasures II

    1. Front Matter
      Pages 455-455
    2. Jürgen Pulkus, Srinivas Vivek
      Pages 479-497
    3. Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun
      Pages 498-514
  11. Hardware Implementations

    1. Front Matter
      Pages 515-515
    2. Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki
      Pages 538-558
    3. Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner
      Pages 559-577
  12. Fault Attacks

    1. Front Matter
      Pages 579-579
    2. Sarani Bhattacharya, Debdeep Mukhopadhyay
      Pages 602-624
    3. Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
      Pages 625-647
  13. Back Matter
    Pages 649-650

About these proceedings


This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016.
The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.


cryptography hardware attacks and countermeasures hardware reverse engineering hardware security implementation hash functions hyperelliptic curve cryptography key management malicious design modifications public key (asymmetric) techniques security side-challen analysis and countermeasures tamper-proof designs tamper-resistant designs trusted computing virtualization

Editors and affiliations

  • Benedikt Gierlichs
    • 1
  • Axel Y. Poschmann
    • 2
  1. 1.KU Leuven LeuvenBelgium
  2. 2.NXP Semiconductors Germany GmbH HamburgGermany

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-662-53139-6
  • Online ISBN 978-3-662-53140-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Materials & Steel
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment
Oil, Gas & Geosciences