Cryptographic Hardware and Embedded Systems – CHES 2017

19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings

  • Wieland Fischer
  • Naofumi Homma
Conference proceedings CHES 2017
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10529)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Side Channel Analysis I

    1. Front Matter
      Pages 1-1
    2. Mélissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson
      Pages 3-23
    3. Eleonora Cagli, Cécile Dumas, Emmanuel Prouff
      Pages 45-68
    4. Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
      Pages 69-90
  3. Higher Order Countermeasures

    1. Front Matter
      Pages 91-91
    2. Hannes Gross, Stefan Mangard
      Pages 115-136
    3. Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek
      Pages 154-171
  4. Emerging Attacks I

    1. Front Matter
      Pages 173-173
    2. Stéphanie Anceau, Pierre Bleuet, Jessy Clédière, Laurent Maingault, Jean-luc Rainard, Rémi Tucoulou
      Pages 175-188
    3. Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte
      Pages 189-210
  5. Post Quantum Implementations

    1. Front Matter
      Pages 211-211
    2. Tung Chou
      Pages 213-231
    3. Andreas Hülsing, Joost Rijneveld, John Schanck, Peter Schwabe
      Pages 232-252
    4. Wen Wang, Jakub Szefer, Ruben Niederhagen
      Pages 253-274
  6. Cipher and Protocol Design

    1. Front Matter
      Pages 275-275
  7. Cipher & Protocol Design

    1. Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi
      Pages 277-298

About these proceedings

Introduction

This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017.
The 33 full papers presented in this volume were carefully reviewed and selected from 130 submissions. 

The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.

Keywords

data security cryptography embedded systems side channel attack authentication side-channel public key cryptography computer architecture encryption cryptographic hardware emerging attacks higher order countermeasures post quantum implementations security evaluation FPGA security encoding techniques

Editors and affiliations

  • Wieland Fischer
    • 1
  • Naofumi Homma
    • 2
  1. 1.Infineon TechnologiesNeubibergGermany
  2. 2.Tohoku UniversitySendai-shiJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-66787-4
  • Copyright Information International Association for Cryptologic Research 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-66786-7
  • Online ISBN 978-3-319-66787-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book