Cryptographic Hardware and Embedded Systems - CHES 2007

9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings

  • Editors
  • Pascal Paillier
  • Ingrid Verbauwhede
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4727)

Table of contents

  1. Front Matter
  2. Differential and Higher Order Attacks

  3. Random Number Generation and Device Identification

    1. Markus Dichtl, Jovan Dj. Golić
      Pages 45-62
    2. Jorge Guajardo, Sandeep S. Kumar, Geert-Jan Schrijen, Pim Tuyls
      Pages 63-80
  4. Logic Styles: Masking and Routing

    1. Thomas Popp, Mario Kirschbaum, Thomas Zefferer, Stefan Mangard
      Pages 81-94
    2. Patrick Schaumont, Kris Tiri
      Pages 95-106
    3. Benedikt Gierlichs
      Pages 107-120
  5. Efficient Algorithms for Embedded Processors

    1. Mitsuru Matsui, Junko Nakajima
      Pages 121-134
    2. Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Özgül Küçük et al.
      Pages 148-165
  6. Collision Attacks and Fault Analysis

    1. Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovich, Timo Kasper
      Pages 166-180
    2. Alex Biryukov, Dmitry Khovratovich
      Pages 195-208
  7. High Speed AES Implementations

    1. Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert Felber, Matthias Braendli
      Pages 227-238
  8. Public-Key Cryptography

    1. Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto
      Pages 239-255
    2. Kimmo Järvinen, Juha Forsten, Jorma Skyttä
      Pages 256-271

About these proceedings

Introduction

CHES2007,theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) and held in Vienna, Austria, September 10–13, 2007. The workshop - ceived 99 submissions from 24 countries, of which the Program Committee (39 members from 15 countries) selected 31 for presentation. For the ?rst time in the history of CHES, each submission was reviewed by at least four reviewers instead of three (and at least ?ve for submissions by PC members, those now being limited to two per member) and many submitted papers have received plenty of extra reviews (some papers received up to nine reviews), thus totalling the unprecedented record of 483 reviews overall. Thepaperscollectedinthisvolumerepresentcutting-edgeworldwideresearch in the rapidly evolving ?elds of crypto-hardware, fault-based and side-channel cryptanalysis, and embedded cryptography, at the crossing of academic and - dustrial research. The wide diversity of subjects appearing in these proceedings covers virtually all related areas and shows our e?orts to extend the scope of CHES more than usual. Although a relatively young workshop, CHES is now ?rmlyestablishedasascienti?ceventofreferenceappreciatedbymoreandmore renowned experts of theory and practice: many high-quality works were subm- ted, all of which, sadly, could not be accepted. Selecting from so many good worksis no easy task and our deepest thanks go to the members of the Program Committee for their involvement, excellence, and team spirit. We are grateful to the numerous external reviewers listed below for their expertise and assistance in our deliberations.

Keywords

AES Information RSA public keys Signatur Ultra cipher implementation communication cryptanalysis cryptographic hardware cryptography network security power analysis security side-channel attacks smart car

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-74735-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-74734-5
  • Online ISBN 978-3-540-74735-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book