Cryptographic Hardware and Embedded Systems – CHES 2014

16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings

  • Lejla Batina
  • Matthew Robshaw
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8731)

Table of contents

  1. Front Matter
  2. Side-Channel Attacks

    1. Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata et al.
      Pages 1-16
    2. Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
      Pages 35-54
    3. Annelie Heuser, Olivier Rioul, Sylvain Guilley
      Pages 55-74
  3. New Attacks and Constructions

    1. Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom
      Pages 75-92
    2. Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
      Pages 93-111
    3. Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki et al.
      Pages 112-126
  4. Countermeasures

    1. A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo
      Pages 147-169
    2. Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala
      Pages 188-205
    3. Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz
      Pages 206-222
  5. Algorithm Specific SCA

    1. Aurélie Bauer, Eliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche
      Pages 223-241
    2. Daniel Genkin, Itamar Pipman, Eran Tromer
      Pages 242-260
    3. Noboru Kunihiro, Junya Honda
      Pages 261-278
    4. Christophe Clavier, Damien Marion, Antoine Wurcker
      Pages 279-297
  6. ECC Implementations

    1. Thomas Unterluggauer, Erich Wenger
      Pages 298-315
    2. Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
      Pages 316-334
  7. Implementations

    1. Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra
      Pages 335-352

About these proceedings

Introduction

This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.

Keywords

embedded systems security hardware attacks and countermeasures hardware-oriented cryptographic designs and cryptanalysis physical unclonable functions random number generators security and privacy security in hardware side-channel analysis and countermeasures tamper-resistant designs

Editors and affiliations

  • Lejla Batina
    • 1
  • Matthew Robshaw
    • 2
  1. 1.FNWI-iCIS/DSRadboud University NijmegenNijmegenThe Netherlands
  2. 2.Impinj, Inc.SeattleUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-44709-3
  • Copyright Information International Association for Cryptologic Research 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-44708-6
  • Online ISBN 978-3-662-44709-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349