Skip to main content
Book cover

Cryptographic Hardware and Embedded Systems -- CHES 2015

17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings

  • Conference proceedings
  • © 2015

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9293)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: CHES 2015.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (34 papers)

  1. Processing Techniques in Side-Channel Analysis

  2. Cryptographic Hardware Implementations

  3. Homomorphic Encryption in Hardware

  4. Side-Channel Attacks on Public Key Cryptography

  5. Cipher Design and Cryptanalysis

Other volumes

  1. Cryptographic Hardware and Embedded Systems -- CHES 2015

Keywords

About this book

This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully reviewed and selected from 128 submissions. They are organized in the following topical sections: processing techniques in side-channel analysis; cryptographic hardware implementations; homomorphic encryption in hardware; side-channel attacks on public key cryptography; cipher design and cryptanalysis; true random number generators and entropy estimations; side-channel analysis and fault injection attacks; higher-order side-channel attacks; physically unclonable functions and hardware trojans; side-channel attacks in practice; and lattice-based implementations.

Editors and Affiliations

  • University of Bremen, Bremen, Germany

    Tim Güneysu

  • Cryptography Research Inc., San Francisco, USA

    Helena Handschuh

Bibliographic Information

Publish with us