Cryptographic Hardware and Embedded Systems, CHES 2010

12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings

  • Stefan Mangard
  • François-Xavier Standaert

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6225)

Table of contents

  1. Front Matter
  2. Low Cost Cryptography

    1. Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia
      Pages 1-15
    2. Lars Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw
      Pages 16-32
    3. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
      Pages 33-47
  3. Efficient Implementations I

  4. Side-Channel Attacks and Countermeasures I

    1. Jean-Sébastien Coron, Ilya Kizhvatov
      Pages 95-109
    2. Onur Acıiçmez, Billy Bob Brumley, Philipp Grabher
      Pages 110-124
    3. Amir Moradi, Oliver Mischke, Thomas Eisenbarth
      Pages 125-139
    4. Olivier Benoît, Thomas Peyrin
      Pages 140-157
  5. Tamper Resistance and Hardware Trojans

    1. Sergei Skorobogatov
      Pages 158-172
    2. Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia
      Pages 173-187
    3. Jerome Di-Battista, Jean-Christophe Courrege, Bruno Rouzeyre, Lionel Torres, Philippe Perdu
      Pages 188-202
  6. Efficient Implementations II

    1. Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir et al.
      Pages 203-218
    2. Axel Poschmann, San Ling, Huaxiong Wang
      Pages 219-233
    3. Yasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa
      Pages 234-247
  7. SHA-3

    1. Luca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, Frank K. Gürkaynak
      Pages 248-263

About these proceedings


AES FPGA algebraic attacks calculus collision attack cryptanalyis cryptography elliptic curves embedded systems failure analysis hardware trojan hash function power analysis prime field pseudo-random numbers

Editors and affiliations

  • Stefan Mangard
    • 1
  • François-Xavier Standaert
    • 2
  1. 1.Infineon Technologies, Security InnovationNeubibergGermany
  2. 2.UCL Crypto Group, Université catholique de LouvainLouvain-la-NeuveBelgium

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-15030-2
  • Online ISBN 978-3-642-15031-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book