Introduction to the CHES 2013 special issue Guido BertoniJean-Sébastien Coron CHES 2013 17 February 2014 Pages: 1 - 1
Two is the fastest prime: lambda coordinates for binary elliptic curves Thomaz OliveiraJulio LópezFrancisco Rodríguez-Henríquez CHES 2013 28 January 2014 Pages: 3 - 17
Stealthy dopant-level hardware Trojans: extended version Georg T. BeckerFrancesco RegazzoniWayne P. Burleson CHES 2013 29 January 2014 Pages: 19 - 31
Using Bleichenbacher’s solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version Elke De MulderMichael HutterPeter Pearson CHES 2013 02 February 2014 Pages: 33 - 45
Masking vs. multiparty computation: how large is the gap for AES? Vincent GrossoFrançois-Xavier StandaertSebastian Faust CHES 2013 19 March 2014 Pages: 47 - 57
On measurable side-channel leaks inside ASIC design primitives Takeshi SugawaraDaisuke SuzukiTakeshi Fujino CHES 2013 28 February 2014 Pages: 59 - 73