Cryptographic Hardware and Embedded Systems – CHES 2012

14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings

Editors:

ISBN: 978-3-642-33026-1 (Print) 978-3-642-33027-8 (Online)

Table of contents (32 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Intrusive Attacks and Countermeasures

    1. No Access

      Book Chapter

      Pages 1-22

      3D Hardware Canaries

    2. No Access

      Book Chapter

      Pages 23-40

      Breakthrough Silicon Scanning Discovers Backdoor in Military Chip

    3. No Access

      Book Chapter

      Pages 41-57

      Simple Photonic Emission Analysis of AES

  3. Masking

    1. No Access

      Book Chapter

      Pages 58-75

      Compiler Assisted Masking

    2. No Access

      Book Chapter

      Pages 76-91

      Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes

    3. No Access

      Book Chapter

      Pages 92-106

      How Far Should Theory Be from Practice?

    4. No Access

      Book Chapter

      Pages 107-121

      Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking

  4. Improved Fault Attacks and Side Channel Analysis

    1. No Access

      Book Chapter

      Pages 122-139

      A Differential Fault Attack on the Grain Family of Stream Ciphers

    2. No Access

      Book Chapter

      Pages 140-154

      Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model

    3. No Access

      Book Chapter

      Pages 155-174

      Selecting Time Samples for Multivariate DPA Attacks

    4. No Access

      Book Chapter

      Pages 175-192

      Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting

  5. Leakage Resiliency and Security Analysis

    1. No Access

      Book Chapter

      Pages 193-212

      Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs

    2. No Access

      Book Chapter

      Pages 213-232

      Practical Leakage-Resilient Symmetric Cryptography

    3. No Access

      Book Chapter

      Pages 233-250

      A Statistical Model for DPA with Novel Algorithmic Confusion Analysis

  6. Physically Unclonable Functions

    1. No Access

      Book Chapter

      Pages 251-267

      Practical Security Analysis of PUF-Based Two-Player Protocols

    2. No Access

      Book Chapter

      Pages 268-282

      Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment

    3. No Access

      Book Chapter

      Pages 283-301

      PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon

    4. No Access

      Book Chapter

      Pages 302-319

      PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator

  7. Efficient Implementations

    1. No Access

      Book Chapter

      Pages 320-339

      NEON Crypto

    2. No Access

      Book Chapter

      Pages 340-355

      Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware

previous Page of 2