


default search action
13. CHES 2011: Nara, Japan
- Bart Preneel

, Tsuyoshi Takagi:
Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings. Lecture Notes in Computer Science 6917, Springer 2011, ISBN 978-3-642-23950-2
FPGA Implementation
- Philipp Grabher, Johann Großschädl, Simon Hoerder

, Kimmo Järvinen, Dan Page, Stefan Tillich, Marcin Wójcik:
An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension. 1-16 - Mehrdad Majzoobi, Farinaz Koushanfar, Srinivas Devadas:

FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control. 17-32 - Tim Güneysu

, Amir Moradi
:
Generic Side-Channel Countermeasures for Reconfigurable Devices. 33-48
AES
- Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil:

Improved Collision-Correlation Power Analysis on First Order Protected AES. 49-62 - Emmanuel Prouff, Thomas Roche:

Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols. 63-78 - Louis Goubin, Ange Martinelli:

Protecting AES with Shamir's Secret Sharing Scheme. 79-94 - HeeSeok Kim

, Seokhie Hong, Jongin Lim:
A Fast and Provably Secure Higher-Order Masking of AES S-Box. 95-107
Elliptic Curve Cryptosystems
- Jonathan Taverne, Armando Faz-Hernández

, Diego F. Aranha
, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López:
Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication. 108-123 - Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang:

High-Speed High-Security Signatures. 124-142 - Junfeng Fan, Benedikt Gierlichs, Frederik Vercauteren

:
To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order. 143-159
Lattices
- Michael Schneider, Norman Göttert

:
Random Sampling for Short Lattice Vectors on Graphics Cards. 160-175 - Po-Chun Kuo

, Michael Schneider, Özgür Dagdelen, Jan Reichelt, Johannes Buchmann, Chen-Mou Cheng, Bo-Yin Yang:
Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -. 176-191 - Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi

:
Modulus Fault Attacks against RSA-CRT Signatures. 192-206
Side Channel Attacks
- David F. Oswald

, Christof Paar:
Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World. 207-222 - Mathieu Renauld, Dina Kamel, François-Xavier Standaert

, Denis Flandre
:
Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box. 223-239 - Laurie Genelle, Emmanuel Prouff, Michaël Quisquater:

Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. 240-255 - Marcel Medwed, François-Xavier Standaert

:
Extractors against Side-Channel Attacks: Weak or Strong? 256-272
Invited Talk
- Tetsuya Tominaga:

Standardization Works for Security Regarding the Electromagnetic Environment. 273
Fault Attacks
- Patrick Derbez, Pierre-Alain Fouque

, Delphine Leresteux:
Meet-in-the-Middle and Impossible Differential Fault Analysis on AES. 274-291 - Amir Moradi

, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama:
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting. 292-311
Lightweight Symmetric Algorithms
- Andrey Bogdanov, Miroslav Knezevic, Gregor Leander

, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
:
spongent: A Lightweight Hash Function. 312-325 - Jian Guo

, Thomas Peyrin
, Axel Poschmann, Matthew J. B. Robshaw:
The LED Block Cipher. 326-341 - Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, Taizo Shirai:

Piccolo: An Ultra-Lightweight Blockcipher. 342-357
PUFs
- Meng-Day (Mandel) Yu, David M'Raïhi, Richard Sowell, Srinivas Devadas:

Lightweight and Secure PUF Key Storage Using Limits of Machine Learning. 358-373 - Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen

, Heike Schröder, Christian Wachsmann:
Recyclable PUFs: Logically Reconfigurable PUFs. 374-389 - Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, Kouichi Itoh:

Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches. 390-406 - Aswin Raghav Krishna, Seetharam Narasimhan, Xinmu Wang, Swarup Bhunia

:
MECCA: A Robust Low-Overhead PUF Using Embedded Memory Array. 407-420
Public-Key Cryptosystems
- Ray C. C. Cheung

, Sylvain Duquesne, Junfeng Fan, Nicolas Guillermin, Ingrid Verbauwhede
, Gavin Xiaoxu Yao:
FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction. 421-441 - Santosh Ghosh, Dipanwita Roy Chowdhury, Abhijit Das:

High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields. 442-458 - Michael Hutter, Erich Wenger:

Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. 459-474 - Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf:

Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key Systems. 475-490
Hash Functions
- Ekawat Homsirikamol, Marcin Rogawski, Kris Gaj:

Throughput vs. Area Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates Implemented Using Xilinx and Altera FPGAs. 491-506 - Joppe W. Bos, Onur Özen, Martijn Stam:

Efficient Hashing Using the AES Instruction Set. 507-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














