Skip to main content
  • Conference proceedings
  • © 2013

Cryptographic Hardware and Embedded Systems -- CHES 2013

15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings

  • State-of-the-art research

  • Fast-track conference proceedings

  • Unique visibility

  • Includes supplementary material: sn.pub/extras

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8086)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CHES: International Conference on Cryptographic Hardware and Embedded Systems

Conference proceedings info: CHES 2013.

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-40349-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 84.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (27 papers)

  1. Front Matter

  2. Side-Channel Attacks

    1. On the Simplicity of Converting Leakages from Multivariate to Univariate

      • Amir Moradi, Oliver Mischke
      Pages 1-20Open Access
    2. Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack

      • Adrian Thillard, Emmanuel Prouff, Thomas Roche
      Pages 21-36Open Access
    3. Profiling DPA: Efficacy and Efficiency Trade-Offs

      • Carolyn Whitnall, Elisabeth Oswald
      Pages 37-54Open Access
    4. Non-invasive Spoofing Attacks for Anti-lock Braking Systems

      • Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani Srivastava
      Pages 55-72Open Access
  3. Physical Unclonable Function

    1. On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs

      • Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
      Pages 107-125Open Access
  4. Lightweight Cryptography

    1. Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID

      • Peter Pessl, Michael Hutter
      Pages 126-141Open Access
    2. Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

      • Begül Bilgin, Andrey Bogdanov, Miroslav Knežević, Florian Mendel, Qingju Wang
      Pages 142-158Open Access
  5. Hardware Implementations and Fault Attacks

    1. On Measurable Side-Channel Leaks Inside ASIC Design Primitives

      • Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino
      Pages 159-178Open Access
    2. A Very High Speed True Random Number Generator with Entropy Assessment

      • Abdelkarim Cherkaoui, Viktor Fischer, Laurent Fesquet, Alain Aubert
      Pages 179-196Open Access
    3. Stealthy Dopant-Level Hardware Trojans

      • Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
      Pages 197-214Open Access
    4. A Differential Fault Attack on MICKEY 2.0

      • Subhadeep Banik, Subhamoy Maitra
      Pages 215-232Open Access
  6. Efficient and Secure Implementations

    1. Improving Modular Inversion in RNS Using the Plus-Minus Method

      • Karim Bigou, Arnaud Tisserand
      Pages 233-249Open Access
    2. McBits: Fast Constant-Time Code-Based Cryptography

      • Daniel J. Bernstein, Tung Chou, Peter Schwabe
      Pages 250-272Open Access
    3. Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices

      • Stefan Heyse, Ingo von Maurich, Tim Güneysu
      Pages 273-292Open Access
    4. Sleuth: Automated Verification of Software Power Analysis Countermeasures

      • Ali Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne
      Pages 293-310Open Access
  7. Elliptic Curve Cryptography

    1. Lambda Coordinates for Binary Elliptic Curves

      • Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
      Pages 311-330Open Access
    2. High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition

      • Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
      Pages 331-348Open Access

Other Volumes

  1. Cryptographic Hardware and Embedded Systems - CHES 2013

    15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings

About this book

This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.

Keywords

  • PUFs
  • block ciphers
  • computer security
  • encryption
  • masking schemes
  • algorithm analysis and problem complexity

Editors and Affiliations

  • STMicroelectronics, Belgium

    Guido Bertoni

  • University of Luxembourg, Luxembourg, Luxemburg

    Jean-Sébastien Coron

Bibliographic Information

  • Book Title: Cryptographic Hardware and Embedded Systems -- CHES 2013

  • Book Subtitle: 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings

  • Editors: Guido Bertoni, Jean-Sébastien Coron

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-40349-1

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: International Association for Cryptologic Research 2013

  • License: CC BY

  • Softcover ISBN: 978-3-642-40348-4

  • eBook ISBN: 978-3-642-40349-1

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 490

  • Number of Illustrations: 172 b/w illustrations

  • Topics: Cryptology, Data and Information Security, Algorithms

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-40349-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 84.99
Price excludes VAT (USA)