Cryptographic Hardware and Embedded Systems – CHES 2008

10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

  • Editors
  • Elisabeth Oswald
  • Pankaj Rohatgi
Conference proceedings CHES 2008

DOI: 10.1007/978-3-540-85053-3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5154)

Table of contents (29 papers)

  1. Front Matter
  2. Side-Channel Analysis 1

    1. Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform
      Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain
      Pages 1-14
    2. Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
      Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir
      Pages 15-29
  3. Implementations 1

  4. Fault Analysis 1

    1. High-Performance Concurrent Error Detection Scheme for AES Hardware
      Akashi Satoh, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki
      Pages 100-112
    2. A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis
      Mehran Mozaffari-Kermani, Arash Reyhani-Masoleh
      Pages 113-129
  5. Random Number Generation

    1. A Design for a Physical RNG with Robust Entropy Estimators
      Wolfgang Killmann, Werner Schindler
      Pages 146-163
    2. Fast Digital TRNG Based on Metastable Ring Oscillator
      Ihor Vasyltsov, Eduard Hambardzumyan, Young-Sik Kim, Bohdan Karpinskyy
      Pages 164-180
    3. Efficient Helper Data Key Extractor on FPGAs
      Christoph Bösch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Pim Tuyls
      Pages 181-197
  6. Side-Channel Analysis 2

    1. The Carry Leakage on the Randomized Exponent Countermeasure
      Pierre-Alain Fouque, Denis Réal, Frédéric Valette, Mhamed Drissi
      Pages 198-213
  7. Cryptography and Cryptanalysis

    1. Binary Edwards Curves
      Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi
      Pages 244-265
    2. A Real-World Attack Breaking A5/1 within Hours
      Timo Gendrullis, Martin Novotný, Andy Rupp
      Pages 266-282
    3. Hash Functions and RFID Tags: Mind the Gap
      Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matt J. B. Robshaw, Yannick Seurin
      Pages 283-299
  8. Implementations 2

About these proceedings


This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.C., USA, during August 10-13, 2008.

The book contains 2 invited talks and 27 revised full papers which were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on side channel analysis, implementations, fault analysis, random number generation, and cryptography and cryptanalysis.


A5 Error-correcting Code RSA Routing S-Box Secure S-Box Ultra asymmetric cryptography cryptography elliptic curves embedded systems entropy misty side-channel analysis trng

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85052-6
  • Online ISBN 978-3-540-85053-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349