Advertisement

Cryptographic Hardware and Embedded Systems, CHES 2010

12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings

  • Stefan Mangard
  • François-Xavier Standaert

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6225)

Table of contents

  1. Front Matter
  2. Low Cost Cryptography

    1. Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia
      Pages 1-15
    2. Lars Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw
      Pages 16-32
    3. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
      Pages 33-47
  3. Efficient Implementations I

  4. Side-Channel Attacks and Countermeasures I

    1. Jean-Sébastien Coron, Ilya Kizhvatov
      Pages 95-109
    2. Onur Acıiçmez, Billy Bob Brumley, Philipp Grabher
      Pages 110-124
    3. Amir Moradi, Oliver Mischke, Thomas Eisenbarth
      Pages 125-139
    4. Olivier Benoît, Thomas Peyrin
      Pages 140-157
  5. Tamper Resistance and Hardware Trojans

    1. Sergei Skorobogatov
      Pages 158-172
    2. Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia
      Pages 173-187
    3. Jerome Di-Battista, Jean-Christophe Courrege, Bruno Rouzeyre, Lionel Torres, Philippe Perdu
      Pages 188-202
  6. Efficient Implementations II

    1. Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir et al.
      Pages 203-218
    2. Axel Poschmann, San Ling, Huaxiong Wang
      Pages 219-233
    3. Yasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa
      Pages 234-247
  7. SHA-3

    1. Luca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, Frank K. Gürkaynak
      Pages 248-263
  8. Fault Attacks and Countermeasures

    1. Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
      Pages 306-319
    2. Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta
      Pages 320-334
  9. PUFs and RNGs

    1. Maximilian Hofer, Christoph Boehm
      Pages 335-350
    2. Michal Varchola, Milos Drutarovsky
      Pages 351-365
  10. New Designs

    1. Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
      Pages 383-397
    2. Stéphane Badel, Nilay Dağtekin, Jorge Nakahara Jr., Khaled Ouafi, Nicolas Reffé, Pouyan Sepehrdad et al.
      Pages 398-412
  11. Side-Channel Attacks and Countermeasures II

    1. Matthieu Rivain, Emmanuel Prouff
      Pages 413-427
    2. Yossef Oren, Mario Kirschbaum, Thomas Popp, Avishai Wool
      Pages 428-442
    3. Michael Tunstall, Marc Joye
      Pages 443-455
  12. Back Matter

About these proceedings

Keywords

AES FPGA algebraic attacks calculus collision attack cryptanalyis cryptography elliptic curves embedded systems failure analysis hardware trojan hash function power analysis prime field pseudo-random numbers

Editors and affiliations

  • Stefan Mangard
    • 1
  • François-Xavier Standaert
    • 2
  1. 1.Infineon Technologies, Security InnovationNeubibergGermany
  2. 2.UCL Crypto Group, Université catholique de LouvainLouvain-la-NeuveBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-15031-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-15030-2
  • Online ISBN 978-3-642-15031-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site