© 2010

Cryptographic Hardware and Embedded Systems, CHES 2010

12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings

  • Stefan Mangard
  • François-Xavier Standaert
Conference proceedings CHES 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6225)

Table of contents

  1. Front Matter
  2. Low Cost Cryptography

    1. Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia
      Pages 1-15
    2. Lars Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw
      Pages 16-32
    3. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
      Pages 33-47
  3. Efficient Implementations I

  4. Side-Channel Attacks and Countermeasures I

    1. Jean-Sébastien Coron, Ilya Kizhvatov
      Pages 95-109
    2. Onur Acıiçmez, Billy Bob Brumley, Philipp Grabher
      Pages 110-124
    3. Amir Moradi, Oliver Mischke, Thomas Eisenbarth
      Pages 125-139
    4. Olivier Benoît, Thomas Peyrin
      Pages 140-157
  5. Tamper Resistance and Hardware Trojans

    1. Sergei Skorobogatov
      Pages 158-172
    2. Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia
      Pages 173-187
    3. Jerome Di-Battista, Jean-Christophe Courrege, Bruno Rouzeyre, Lionel Torres, Philippe Perdu
      Pages 188-202
  6. Efficient Implementations II

    1. Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir et al.
      Pages 203-218
    2. Axel Poschmann, San Ling, Huaxiong Wang
      Pages 219-233
    3. Yasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa
      Pages 234-247
  7. SHA-3

    1. Luca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, Frank K. Gürkaynak
      Pages 248-263

About these proceedings


AES FPGA algebraic attacks calculus collision attack cryptanalyis cryptography elliptic curves embedded systems failure analysis hardware trojan hash function power analysis prime field pseudo-random numbers

Editors and affiliations

  • Stefan Mangard
    • 1
  • François-Xavier Standaert
    • 2
  1. 1.Infineon Technologies, Security InnovationNeubibergGermany
  2. 2.UCL Crypto Group, Université catholique de LouvainLouvain-la-NeuveBelgium

Bibliographic information