CHES A

30 papers

YearTitle / Authors
2008A Design for a Physical RNG with Robust Entropy Estimators.
Wolfgang Killmann, Werner Schindler
2008A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis.
Mehran Mozaffari Kermani, Arash Reyhani-Masoleh
2008A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases.
Arash Reyhani-Masoleh
2008A Real-World Attack Breaking A5/1 within Hours.
Timo Gendrullis, Martin Novotný, Andy Rupp
2008A Very Compact Hardware Implementation of the MISTY1 Block Cipher.
Dai Yamamoto, Jun Yajima, Kouichi Itoh
2008A Vision for Platform Security.
Ernie Brickell
2008Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform.
Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain
2008Attacking State-of-the-Art Software Countermeasures-A Case Study for AES.
Stefan Tillich, Christoph Herbst
2008Binary Edwards Curves.
Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi
2008Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs.
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir
2008Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings
Elisabeth Oswald, Pankaj Rohatgi
2008Divided Backend Duplication Methodology for Balanced Dual Rail Routing.
Karthik Baddam, Mark Zwolinski
2008Efficient Helper Data Key Extractor on FPGAs.
Christoph Bösch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Pim Tuyls
2008Exploiting the Power of GPUs for Asymmetric Cryptography.
Robert Szerwinski, Tim Güneysu
2008Fast Digital TRNG Based on Metastable Ring Oscillator.
Ihor V. Vasyltsov, Eduard Hambardzumyan, Young-Sik Kim, Bohdan Karpinskyy
2008Hash Functions and RFID Tags: Mind the Gap.
Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin
2008High-Performance Concurrent Error Detection Scheme for AES Hardware.
Akashi Satoh, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki
2008Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography.
Philipp Grabher, Johann Großschädl, Dan Page
2008Multiple-Differential Side-Channel Collision Attacks on AES.
Andrey Bogdanov
2008Mutual Information Analysis.
Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel
2008Perturbating RSA Public Keys: An Improved Attack.
Alexandre Berzati, Cécile Canovas, Louis Goubin
2008Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration.
Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhede
2008RFID and Its Vulnerability to Faults.
Michael Hutter, Jörn-Marc Schmidt, Thomas Plos
2008RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks.
David Vigilant
2008RSA-Past, Present, Future.
Adi Shamir
2008Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths.
Colin D. Walter
2008The Carry Leakage on the Randomized Exponent Countermeasure.
Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi
2008Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?.
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf
2008Ultra High Performance ECC over NIST Primes on Commercial FPGAs.
Tim Güneysu, Christof Paar
2008Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages.
François-Xavier Standaert, Cédric Archambeau