Cryptographic Hardware and Embedded Systems - CHES 2013

15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings

  • Guido Bertoni
  • Jean-Sébastien Coron
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8086)

Table of contents

  1. Front Matter
  2. Side-Channel Attacks

    1. Adrian Thillard, Emmanuel Prouff, Thomas Roche
      Pages 21-36
    2. Carolyn Whitnall, Elisabeth Oswald
      Pages 37-54
    3. Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani Srivastava
      Pages 55-72
  3. Physical Unclonable Function

  4. Lightweight Cryptography

    1. Begül Bilgin, Andrey Bogdanov, Miroslav Knežević, Florian Mendel, Qingju Wang
      Pages 142-158
  5. Hardware Implementations and Fault Attacks

    1. Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino
      Pages 159-178
    2. Abdelkarim Cherkaoui, Viktor Fischer, Laurent Fesquet, Alain Aubert
      Pages 179-196
    3. Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
      Pages 197-214
    4. Subhadeep Banik, Subhamoy Maitra
      Pages 215-232
  6. Efficient and Secure Implementations

    1. Karim Bigou, Arnaud Tisserand
      Pages 233-249
    2. Daniel J. Bernstein, Tung Chou, Peter Schwabe
      Pages 250-272
    3. Ali Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne
      Pages 293-310
  7. Elliptic Curve Cryptography

    1. Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
      Pages 311-330
    2. Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
      Pages 331-348

About these proceedings

Introduction

This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.

Keywords

PUFs block ciphers computer security encryption masking schemes

Editors and affiliations

  • Guido Bertoni
    • 1
  • Jean-Sébastien Coron
    • 2
  1. 1.STMicroelectronicsBelgium
  2. 2.University of LuxembourgLuxembourgLuxemburg

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-40349-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-40348-4
  • Online ISBN 978-3-642-40349-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349