Skip to main content
  • Conference proceedings
  • © 2012

Cryptographic Hardware and Embedded Systems -- CHES 2012

14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7428)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CHES: International Conference on Cryptographic Hardware and Embedded Systems

Conference proceedings info: CHES 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

  2. Intrusive Attacks and Countermeasures

    1. 3D Hardware Canaries

      • Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan et al.
      Pages 1-22
    2. Breakthrough Silicon Scanning Discovers Backdoor in Military Chip

      • Sergei Skorobogatov, Christopher Woods
      Pages 23-40
    3. Simple Photonic Emission Analysis of AES

      • Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert
      Pages 41-57
  3. Masking

    1. Compiler Assisted Masking

      • Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall
      Pages 58-75
    2. Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes

      • Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz
      Pages 76-91
    3. How Far Should Theory Be from Practice?

      • Amir Moradi, Oliver Mischke
      Pages 92-106
  4. Improved Fault Attacks and Side Channel Analysis

    1. A Differential Fault Attack on the Grain Family of Stream Ciphers

      • Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
      Pages 122-139
    2. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model

      • Yossef Oren, Mathieu Renauld, François-Xavier Standaert, Avishai Wool
      Pages 140-154
    3. Selecting Time Samples for Multivariate DPA Attacks

      • Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
      Pages 155-174
    4. Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting

      • Benoît Gérard, François-Xavier Standaert
      Pages 175-192
  5. Leakage Resiliency and Security Analysis

    1. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs

      • Marcel Medwed, François-Xavier Standaert, Antoine Joux
      Pages 193-212
    2. Practical Leakage-Resilient Symmetric Cryptography

      • Sebastian Faust, Krzysztof Pietrzak, Joachim Schipper
      Pages 213-232
    3. A Statistical Model for DPA with Novel Algorithmic Confusion Analysis

      • Yunsi Fei, Qiasi Luo, A. Adam Ding
      Pages 233-250
  6. Physically Unclonable Functions

    1. Practical Security Analysis of PUF-Based Two-Player Protocols

      • Ulrich Rührmair, Marten van Dijk
      Pages 251-267
    2. Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment

      • Vincent van der Leest, Bart Preneel, Erik van der Sluis
      Pages 268-282
    3. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon

      • Stefan Katzenbeisser, Ãœnal KocabaÅŸ, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
      Pages 283-301
    4. PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator

      • Roel Maes, Anthony Van Herrewege, Ingrid Verbauwhede
      Pages 302-319
  7. Efficient Implementations

    1. NEON Crypto

      • Daniel J. Bernstein, Peter Schwabe
      Pages 320-339

Other Volumes

  1. Cryptographic Hardware and Embedded Systems – CHES 2012

About this book

This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.

Editors and Affiliations

  • French Network and Information Security Agency (FNISA), Paris, France

    Emmanuel Prouff

  • The Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute, Blacksburg, USA

    Patrick Schaumont

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access