Cryptographic Hardware and Embedded Systems – CHES 2012

14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings

  • Emmanuel Prouff
  • Patrick Schaumont
Conference proceedings CHES 2012

DOI: 10.1007/978-3-642-33027-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7428)

Table of contents (32 papers)

  1. Front Matter
  2. Intrusive Attacks and Countermeasures

    1. 3D Hardware Canaries
      Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan et al.
      Pages 1-22
    2. Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
      Sergei Skorobogatov, Christopher Woods
      Pages 23-40
    3. Simple Photonic Emission Analysis of AES
      Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert
      Pages 41-57
  3. Masking

    1. Compiler Assisted Masking
      Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall
      Pages 58-75
    2. Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
      Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz
      Pages 76-91
    3. How Far Should Theory Be from Practice?
      Amir Moradi, Oliver Mischke
      Pages 92-106
  4. Improved Fault Attacks and Side Channel Analysis

    1. A Differential Fault Attack on the Grain Family of Stream Ciphers
      Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
      Pages 122-139
    2. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
      Yossef Oren, Mathieu Renauld, François-Xavier Standaert, Avishai Wool
      Pages 140-154
    3. Selecting Time Samples for Multivariate DPA Attacks
      Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
      Pages 155-174
  5. Leakage Resiliency and Security Analysis

    1. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
      Marcel Medwed, François-Xavier Standaert, Antoine Joux
      Pages 193-212
    2. Practical Leakage-Resilient Symmetric Cryptography
      Sebastian Faust, Krzysztof Pietrzak, Joachim Schipper
      Pages 213-232
    3. A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
      Yunsi Fei, Qiasi Luo, A. Adam Ding
      Pages 233-250
  6. Physically Unclonable Functions

    1. Practical Security Analysis of PUF-Based Two-Player Protocols
      Ulrich Rührmair, Marten van Dijk
      Pages 251-267
    2. Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment
      Vincent van der Leest, Bart Preneel, Erik van der Sluis
      Pages 268-282
    3. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
      Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
      Pages 283-301
    4. PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
      Roel Maes, Anthony Van Herrewege, Ingrid Verbauwhede
      Pages 302-319
  7. Efficient Implementations

    1. NEON Crypto
      Daniel J. Bernstein, Peter Schwabe
      Pages 320-339

About these proceedings

Introduction

This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.

Keywords

cloud security elliptic curve cryptography post-quantum cryptography smartphones tablets

Editors and affiliations

  • Emmanuel Prouff
    • 1
  • Patrick Schaumont
    • 2
  1. 1.French Network and Information Security Agency (FNISA)ParisFrance
  2. 2.The Bradley Department of Electrical and Computer EngineeringVirginia Polytechnic InstituteBlacksburgUSA

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-33026-1
  • Online ISBN 978-3-642-33027-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349