Advertisement

Cryptographic Hardware and Embedded Systems - CHES 2009

11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings

  • Christophe Clavier
  • Kris Gaj

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5747)

Table of contents

  1. Front Matter
  2. Software Implementations

    1. Emilia Käsper, Peter Schwabe
      Pages 1-17
    2. Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo et al.
      Pages 33-48
    3. Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, Christof Paar
      Pages 49-64
  3. Invited Talk 1

  4. Side Channel Analysis of Secret Key Cryptosystems

    1. Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette
      Pages 66-80
    2. Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon
      Pages 97-111
    3. Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust
      Pages 112-127
  5. Side Channel Analysis of Public Key Cryptosystems

    1. Thomas Finke, Max Gebhardt, Werner Schindler
      Pages 141-155
  6. Side Channel and Fault Analysis Countermeasures

    1. Jean-Sébastien Coron, Ilya Kizhvatov
      Pages 156-170
    2. Matthieu Rivain, Emmanuel Prouff, Julien Doget
      Pages 171-188
    3. Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh
      Pages 189-204
    4. Francesco Regazzoni, Alessandro Cevrero, François-Xavier Standaert, Stephane Badel, Theo Kluter, Philip Brisk et al.
      Pages 205-219
  7. Invited Talk 2

  8. Pairing-Based Cryptography

    1. Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
      Pages 225-239
    2. Junfeng Fan, Frederik Vercauteren, Ingrid Verbauwhede
      Pages 240-253
    3. David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwaechter, Markus Langenberg, Dominik Auras et al.
      Pages 254-271
  9. New Ciphers and Efficient Implementations

    1. Christophe De Cannière, Orr Dunkelman, Miroslav Knežević
      Pages 272-288
    2. Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede
      Pages 289-303
  10. TRNGs and Device Identification

    1. Roel Maes, Pim Tuyls, Ingrid Verbauwhede
      Pages 332-347
    2. Ghaith Hammouri, Aykutlu Dana, Berk Sunar
      Pages 348-362
  11. Invited Talk 3

    1. Randy Torrance, Dick James
      Pages 363-381
  12. Hot Topic Session: Hardware Trojans and Trusted ICs

    1. Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne Burleson
      Pages 382-395
    2. Rajat Subhra Chakraborty, Francis Wolff, Somnath Paul, Christos Papachristou, Swarup Bhunia
      Pages 396-410
  13. Theoretical Aspects

    1. Paulo Mateus, Serge Vaudenay
      Pages 411-428
    2. Nicolas Veyrat-Charvillon, François-Xavier Standaert
      Pages 429-443
  14. Fault Analysis

    1. Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier
      Pages 444-456
    2. Matthieu Rivain
      Pages 457-469
  15. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2009, held in Lausanne, Switzerland during September 6-9, 2009.

The book contains 3 invited talks and 29 revised full papers which were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on software implementations, side channel analysis of secret key cryptosystems, side channel analysis of public key cryptosystems, side channel and fault analysis countermeasures, pairing-based cryptography, new ciphers and efficient implementations, TRNGs and device identification, hardware trojans and trusted ICs, theoretical aspects, and fault analysis.

Keywords

AES AES-GCM HMAC RSA RSA-CRT block ciphers cluster analysis cryptanalysis elliptic curves fingerprints finite fields random numbers reverse engineering secure processors steganalysis trojans

Editors and affiliations

  • Christophe Clavier
    • 1
  • Kris Gaj
    • 2
  1. 1.Département de Mathématiques et d’InformatiqueUniversité de LimogesLimogesFrance
  2. 2.ECE DepartmentGeorge Mason UniversityFairfaxUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-04138-9
  • Copyright Information © International Association for Cryptologic Research 2009 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-04137-2
  • Online ISBN 978-3-642-04138-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site