CHES A

31 papers

YearTitle / Authors
2010256 Bit Standardized Crypto for 650 GE - GOST Revisited.
Axel Poschmann, San Ling, Huaxiong Wang
2010A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over \mathbb
Nicolas Guillermin
2010ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware.
Stéphane Badel, Nilay Dagtekin, Jorge Nakahara Jr., Khaled Ouafi, Nicolas Reffé, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay
2010Algebraic Side-Channel Analysis in the Presence of Errors.
Yossef Oren, Mario Kirschbaum, Thomas Popp, Avishai Wool
2010An Alternative to Error Correction for SRAM-Like PUFs.
Maximilian Hofer, Christoph Böhm
2010Analysis and Improvement of the Random Delay Countermeasure of CHES 2009.
Jean-Sébastien Coron, Ilya Kizhvatov
2010Co-
Raveen R. Goundar, Marc Joye, Atsuko Miyaji
2010Coordinate Blinding over Large Prime Fields.
Michael Tunstall, Marc Joye
2010Correlation-Enhanced Power Analysis Collision Attack.
Amir Moradi, Oliver Mischke, Thomas Eisenbarth
2010Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings
Stefan Mangard, François-Xavier Standaert
2010Developing a Hardware Evaluation Method for SHA-3 Candidates.
Luca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, Frank K. Gürkaynak
2010Efficient Techniques for High-Speed Elliptic Curve Cryptography.
Patrick Longa, Catherine H. Gebotys
2010Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs.
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski
2010Fast Exhaustive Search for Polynomial Systems in
Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang
2010Fault Sensitivity Analysis.
Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta
2010Flash Memory 'Bumping' Attacks.
Sergei Skorobogatov
2010Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2010Mixed Bases for Efficient Inversion in \mathbb
Yasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa
2010New High Entropy Element for FPGA Based True Random Number Generators.
Michal Varchola, Milos Drutarovský
2010New Results on Instruction Cache Attacks.
Onur Aciiçmez, Billy Bob Brumley, Philipp Grabher
2010PRINTcipher: A Block Cipher for IC-Printing.
Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw
2010Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures.
Joppe W. Bos, Deian Stefan
2010Provably Secure Higher-Order Masking of AES.
Matthieu Rivain, Emmanuel Prouff
2010Public Key Perturbation of Randomized RSA Implementations.
Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
2010Quark: A Lightweight Hash.
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia
2010Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection.
Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia
2010Side-Channel Analysis of Six SHA-3 Candidates.
Olivier Benoît, Thomas Peyrin
2010Sponge-Based Pseudo-Random Number Generators.
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
2010The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes.
Daisuke Suzuki, Koichi Shimizu
2010When Failure Analysis Meets Side-Channel Attacks.
Jerome Di-Battista, Jean-Christophe Courrège, Bruno Rouzeyre, Lionel Torres, Philippe Perdu
2010XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework.
Christian Wenzel-Benner, Jens Gräf