© 2016

Cryptographic Hardware and Embedded Systems – CHES 2016

18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings

  • Benedikt Gierlichs
  • Axel Y. Poschmann
Conference proceedings CHES 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9813)

Also part of the Security and Cryptology book sub series (LNSC, volume 9813)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Side Channel Analysis

    1. Front Matter
      Pages 1-1
    2. Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul
      Pages 3-22
    3. Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun
      Pages 23-39
    4. François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo
      Pages 40-60
    5. Romain Poussier, François-Xavier Standaert, Vincent Grosso
      Pages 61-81
  3. Automotive Security

    1. Front Matter
      Pages 83-83
    2. Stefan Nürnberger, Christian Rossow
      Pages 106-124
  4. Invasive Attacks

    1. Front Matter
      Pages 125-125
    2. Yang Xie, Ankur Srivastava
      Pages 127-146
    3. Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert
      Pages 147-167
  5. Side Channel Countermeasures I

    1. Front Matter
      Pages 169-169
    2. Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
      Pages 171-193
    3. Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
      Pages 194-212
  6. New Directions

    1. Front Matter
      Pages 213-213
    2. Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
      Pages 215-236
  7. Software Implementations

    1. Front Matter
      Pages 257-257
    2. Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez
      Pages 259-279

About these proceedings


This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016.
The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.


cryptography hardware attacks and countermeasures hardware reverse engineering hardware security implementation hash functions hyperelliptic curve cryptography key management malicious design modifications public key (asymmetric) techniques security side-challen analysis and countermeasures tamper-proof designs tamper-resistant designs trusted computing virtualization

Editors and affiliations

  • Benedikt Gierlichs
    • 1
  • Axel Y. Poschmann
    • 2
  1. 1.KU Leuven LeuvenBelgium
  2. 2.NXP Semiconductors Germany GmbH HamburgGermany

Bibliographic information