Cryptographic Hardware and Embedded Systems - CHES 2013

15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings

Editors:

ISBN: 978-3-642-40348-4 (Print) 978-3-642-40349-1 (Online)

Table of contents (27 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Side-Channel Attacks

    1. No Access

      Book Chapter

      Pages 1-20

      On the Simplicity of Converting Leakages from Multivariate to Univariate

    2. No Access

      Book Chapter

      Pages 21-36

      Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack

    3. No Access

      Book Chapter

      Pages 37-54

      Profiling DPA: Efficacy and Efficiency Trade-Offs

    4. No Access

      Book Chapter

      Pages 55-72

      Non-invasive Spoofing Attacks for Anti-lock Braking Systems

  3. Physical Unclonable Function

    1. No Access

      Book Chapter

      Pages 73-89

      An Accurate Probabilistic Reliability Model for Silicon PUFs

    2. No Access

      Book Chapter

      Pages 90-106

      A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement

    3. No Access

      Book Chapter

      Pages 107-125

      On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs

  4. Lightweight Cryptography

    1. No Access

      Book Chapter

      Pages 126-141

      Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID

    2. No Access

      Book Chapter

      Pages 142-158

      Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

  5. Hardware Implementations and Fault Attacks

    1. No Access

      Book Chapter

      Pages 159-178

      On Measurable Side-Channel Leaks Inside ASIC Design Primitives

    2. No Access

      Book Chapter

      Pages 179-196

      A Very High Speed True Random Number Generator with Entropy Assessment

    3. No Access

      Book Chapter

      Pages 197-214

      Stealthy Dopant-Level Hardware Trojans

    4. No Access

      Book Chapter

      Pages 215-232

      A Differential Fault Attack on MICKEY 2.0

  6. Efficient and Secure Implementations

    1. No Access

      Book Chapter

      Pages 233-249

      Improving Modular Inversion in RNS Using the Plus-Minus Method

    2. No Access

      Book Chapter

      Pages 250-272

      McBits: Fast Constant-Time Code-Based Cryptography

    3. No Access

      Book Chapter

      Pages 273-292

      Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices

    4. No Access

      Book Chapter

      Pages 293-310

      Sleuth: Automated Verification of Software Power Analysis Countermeasures

  7. Elliptic Curve Cryptography

    1. No Access

      Book Chapter

      Pages 311-330

      Lambda Coordinates for Binary Elliptic Curves

    2. No Access

      Book Chapter

      Pages 331-348

      High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition

    3. No Access

      Book Chapter

      Pages 349-364

      On the Implementation of Unified Arithmetic on Binary Huff Curves

previous Page of 2