© 2014

Cryptographic Hardware and Embedded Systems – CHES 2014

16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings

  • Lejla Batina
  • Matthew Robshaw
Conference proceedings CHES 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8731)

Table of contents

  1. Implementations

    1. Thomas Pöppelmann, Léo Ducas, Tim Güneysu
      Pages 353-370
    2. Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede
      Pages 371-391
  2. Hardware Implementations of Symmetric Cryptosystems

    1. Paweł Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski et al.
      Pages 392-413
    2. Hai Brenner, Lubos Gaspar, Gaëtan Leurent, Alon Rosen, François-Xavier Standaert
      Pages 414-432
    3. Khoongming Khoo, Thomas Peyrin, Axel Y. Poschmann, Huihui Yap
      Pages 433-450
  3. PUFs

    1. Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede
      Pages 451-475
    2. Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Mehrdad Majzoobi, Farinaz Koushanfar et al.
      Pages 476-492
    3. Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier et al.
      Pages 493-509
  4. RNGs and SCA Issues in Hardware

    1. Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing
      Pages 544-561
    2. Amir Moradi
      Pages 562-579
    3. Andrew J. Leiserson, Mark E. Marson, Megan A. Wachs
      Pages 580-597
    4. Amir Moradi, Vincent Immler
      Pages 598-615
  5. Back Matter

About these proceedings


This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.


embedded systems security hardware attacks and countermeasures hardware-oriented cryptographic designs and cryptanalysis physical unclonable functions random number generators security and privacy security in hardware side-channel analysis and countermeasures tamper-resistant designs

Editors and affiliations

  • Lejla Batina
    • 1
  • Matthew Robshaw
    • 2
  1. 1.FNWI-iCIS/DSRadboud University NijmegenNijmegenThe Netherlands
  2. 2.Impinj, Inc.SeattleUSA

Bibliographic information

  • Book Title Cryptographic Hardware and Embedded Systems – CHES 2014
  • Book Subtitle 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings
  • Editors Lejla Batina
    Matthew Robshaw
  • Series Title Lecture Notes in Computer Science
  • DOI
  • Copyright Information International Association for Cryptologic Research 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-662-44708-6
  • eBook ISBN 978-3-662-44709-3
  • Series ISSN 0302-9743
  • Series E-ISSN 1611-3349
  • Edition Number 1
  • Number of Pages XIV, 618
  • Number of Illustrations 192 b/w illustrations, 0 illustrations in colour
  • Topics Cryptology
    Systems and Data Security
    Special Purpose and Application-Based Systems
  • Buy this book on publisher's site