Cryptographic Hardware and Embedded Systems - CHES 2013

15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings

  • Guido Bertoni
  • Jean-Sébastien Coron
Conference proceedings CHES 2013

DOI: 10.1007/978-3-642-40349-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8086)

Table of contents (27 papers)

  1. Front Matter
  2. Side-Channel Attacks

    1. Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
      Adrian Thillard, Emmanuel Prouff, Thomas Roche
      Pages 21-36
    2. Profiling DPA: Efficacy and Efficiency Trade-Offs
      Carolyn Whitnall, Elisabeth Oswald
      Pages 37-54
    3. Non-invasive Spoofing Attacks for Anti-lock Braking Systems
      Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani Srivastava
      Pages 55-72
  3. Physical Unclonable Function

  4. Lightweight Cryptography

    1. Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
      Begül Bilgin, Andrey Bogdanov, Miroslav Knežević, Florian Mendel, Qingju Wang
      Pages 142-158
  5. Hardware Implementations and Fault Attacks

    1. On Measurable Side-Channel Leaks Inside ASIC Design Primitives
      Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino
      Pages 159-178
    2. A Very High Speed True Random Number Generator with Entropy Assessment
      Abdelkarim Cherkaoui, Viktor Fischer, Laurent Fesquet, Alain Aubert
      Pages 179-196
    3. Stealthy Dopant-Level Hardware Trojans
      Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
      Pages 197-214
    4. A Differential Fault Attack on MICKEY 2.0
      Subhadeep Banik, Subhamoy Maitra
      Pages 215-232
  6. Efficient and Secure Implementations

    1. Improving Modular Inversion in RNS Using the Plus-Minus Method
      Karim Bigou, Arnaud Tisserand
      Pages 233-249
    2. McBits: Fast Constant-Time Code-Based Cryptography
      Daniel J. Bernstein, Tung Chou, Peter Schwabe
      Pages 250-272
    3. Sleuth: Automated Verification of Software Power Analysis Countermeasures
      Ali Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne
      Pages 293-310
  7. Elliptic Curve Cryptography

    1. Lambda Coordinates for Binary Elliptic Curves
      Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
      Pages 311-330
    2. High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition
      Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
      Pages 331-348

About these proceedings


This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.


PUFs block ciphers computer security encryption masking schemes

Editors and affiliations

  • Guido Bertoni
    • 1
  • Jean-Sébastien Coron
    • 2
  1. 1.STMicroelectronicsBelgium
  2. 2.University of LuxembourgLuxembourgLuxemburg

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-40348-4
  • Online ISBN 978-3-642-40349-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349