Advertisement

Cryptographic Hardware and Embedded Systems – CHES 2014

16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings

  • Lejla Batina
  • Matthew Robshaw

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8731)

Table of contents

  1. Front Matter
  2. Side-Channel Attacks

    1. Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata et al.
      Pages 1-16
    2. Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
      Pages 35-54
    3. Annelie Heuser, Olivier Rioul, Sylvain Guilley
      Pages 55-74
  3. New Attacks and Constructions

    1. Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom
      Pages 75-92
    2. Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
      Pages 93-111
    3. Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki et al.
      Pages 112-126
  4. Countermeasures

    1. A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo
      Pages 147-169
    2. Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala
      Pages 188-205
    3. Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz
      Pages 206-222
  5. Algorithm Specific SCA

    1. Aurélie Bauer, Eliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche
      Pages 223-241
    2. Daniel Genkin, Itamar Pipman, Eran Tromer
      Pages 242-260
    3. Noboru Kunihiro, Junya Honda
      Pages 261-278
    4. Christophe Clavier, Damien Marion, Antoine Wurcker
      Pages 279-297
  6. ECC Implementations

    1. Thomas Unterluggauer, Erich Wenger
      Pages 298-315
    2. Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
      Pages 316-334
  7. Implementations

    1. Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra
      Pages 335-352
    2. Thomas Pöppelmann, Léo Ducas, Tim Güneysu
      Pages 353-370
    3. Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede
      Pages 371-391
  8. Hardware Implementations of Symmetric Cryptosystems

    1. Paweł Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski et al.
      Pages 392-413
    2. Hai Brenner, Lubos Gaspar, Gaëtan Leurent, Alon Rosen, François-Xavier Standaert
      Pages 414-432
    3. Khoongming Khoo, Thomas Peyrin, Axel Y. Poschmann, Huihui Yap
      Pages 433-450
  9. PUFs

    1. Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede
      Pages 451-475
    2. Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Mehrdad Majzoobi, Farinaz Koushanfar et al.
      Pages 476-492
    3. Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier et al.
      Pages 493-509
  10. RNGs and SCA Issues in Hardware

    1. Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing
      Pages 544-561
    2. Amir Moradi
      Pages 562-579
    3. Andrew J. Leiserson, Mark E. Marson, Megan A. Wachs
      Pages 580-597
    4. Amir Moradi, Vincent Immler
      Pages 598-615
  11. Back Matter

About these proceedings

Introduction

This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.

Keywords

embedded systems security hardware attacks and countermeasures hardware-oriented cryptographic designs and cryptanalysis physical unclonable functions random number generators security and privacy security in hardware side-channel analysis and countermeasures tamper-resistant designs

Editors and affiliations

  • Lejla Batina
    • 1
  • Matthew Robshaw
    • 2
  1. 1.FNWI-iCIS/DSRadboud University NijmegenNijmegenThe Netherlands
  2. 2.Impinj, Inc.SeattleUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-44709-3
  • Copyright Information International Association for Cryptologic Research 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-44708-6
  • Online ISBN 978-3-662-44709-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace