Cryptographic Hardware and Embedded Systems, CHES 2010

12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings

  • Stefan Mangard
  • François-Xavier Standaert
Conference proceedings CHES 2010
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6225)

Table of contents

  1. Front Matter
  2. Low Cost Cryptography

    1. Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia
      Pages 1-15
    2. Lars Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw
      Pages 16-32
    3. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
      Pages 33-47
  3. Efficient Implementations I

  4. Side-Channel Attacks and Countermeasures I

    1. Jean-Sébastien Coron, Ilya Kizhvatov
      Pages 95-109
    2. Onur Acıiçmez, Billy Bob Brumley, Philipp Grabher
      Pages 110-124
    3. Amir Moradi, Oliver Mischke, Thomas Eisenbarth
      Pages 125-139
    4. Olivier Benoît, Thomas Peyrin
      Pages 140-157
  5. Tamper Resistance and Hardware Trojans

    1. Sergei Skorobogatov
      Pages 158-172
    2. Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia
      Pages 173-187
    3. Jerome Di-Battista, Jean-Christophe Courrege, Bruno Rouzeyre, Lionel Torres, Philippe Perdu
      Pages 188-202
  6. Efficient Implementations II

    1. Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir et al.
      Pages 203-218
    2. Axel Poschmann, San Ling, Huaxiong Wang
      Pages 219-233
    3. Yasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa
      Pages 234-247
  7. SHA-3

    1. Luca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, Frank K. Gürkaynak
      Pages 248-263

About these proceedings

Keywords

AES FPGA algebraic attacks calculus collision attack cryptanalyis cryptography elliptic curves embedded systems failure analysis hardware trojan hash function power analysis prime field pseudo-random numbers

Editors and affiliations

  • Stefan Mangard
    • 1
  • François-Xavier Standaert
    • 2
  1. 1.Infineon Technologies, Security InnovationNeubibergGermany
  2. 2.UCL Crypto Group, Université catholique de LouvainLouvain-la-NeuveBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-15031-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-15030-2
  • Online ISBN 978-3-642-15031-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book