Cryptographic Hardware and Embedded Systems – CHES 2012

14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings

  • Emmanuel Prouff
  • Patrick Schaumont

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7428)

Table of contents

  1. Front Matter
  2. Intrusive Attacks and Countermeasures

    1. Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan et al.
      Pages 1-22
    2. Sergei Skorobogatov, Christopher Woods
      Pages 23-40
    3. Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert
      Pages 41-57
  3. Masking

    1. Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall
      Pages 58-75
    2. Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz
      Pages 76-91
    3. Amir Moradi, Oliver Mischke
      Pages 92-106
  4. Improved Fault Attacks and Side Channel Analysis

    1. Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
      Pages 122-139
    2. Yossef Oren, Mathieu Renauld, François-Xavier Standaert, Avishai Wool
      Pages 140-154
    3. Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
      Pages 155-174
  5. Leakage Resiliency and Security Analysis

    1. Marcel Medwed, François-Xavier Standaert, Antoine Joux
      Pages 193-212
    2. Sebastian Faust, Krzysztof Pietrzak, Joachim Schipper
      Pages 213-232
    3. Yunsi Fei, Qiasi Luo, A. Adam Ding
      Pages 233-250
  6. Physically Unclonable Functions

    1. Ulrich Rührmair, Marten van Dijk
      Pages 251-267
    2. Vincent van der Leest, Bart Preneel, Erik van der Sluis
      Pages 268-282
    3. Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
      Pages 283-301
    4. Roel Maes, Anthony Van Herrewege, Ingrid Verbauwhede
      Pages 302-319
  7. Efficient Implementations

    1. Daniel J. Bernstein, Peter Schwabe
      Pages 320-339

About these proceedings

Introduction

This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.

Keywords

cloud security elliptic curve cryptography post-quantum cryptography smartphones tablets

Editors and affiliations

  • Emmanuel Prouff
    • 1
  • Patrick Schaumont
    • 2
  1. 1.French Network and Information Security Agency (FNISA)ParisFrance
  2. 2.The Bradley Department of Electrical and Computer EngineeringVirginia Polytechnic InstituteBlacksburgUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-33027-8
  • Copyright Information International Association for Cryptologic Research 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-33026-1
  • Online ISBN 978-3-642-33027-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book