CHES A

28 papers

YearTitle / Authors
2013A Differential Fault Attack on MICKEY 2.0.
Subhadeep Banik, Subhamoy Maitra
2013A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement.
Mudit Bhargava, Ken Mai
2013A New Model for Error-Tolerant Side-Channel Cube Attacks.
Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede
2013A Very High Speed True Random Number Generator with Entropy Assessment.
Abdelkarim Cherkaoui, Viktor Fischer, Laurent Fesquet, Alain Aubert
2013An Accurate Probabilistic Reliability Model for Silicon PUFs.
Roel Maes
2013Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012.
Arnab Roy, Srinivas Vivek
2013Block Ciphers That Are Easier to Mask: How Far Can We Go?
Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert
2013Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings
Guido Bertoni, Jean-Sébastien Coron
2013Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware.
Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang
2013High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition.
Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter
2013Improving Modular Inversion in RNS Using the Plus-Minus Method.
Karim Bigou, Arnaud Tisserand
2013Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults.
Ronan Lashermes, Jacques J. A. Fournier, Louis Goubin
2013Lambda Coordinates for Binary Elliptic Curves.
Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
2013Leakage-Resilient Symmetric Encryption via Re-keying.
Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque
2013Masking vs. Multiparty Computation: How Large Is the Gap for AES?
Vincent Grosso, François-Xavier Standaert, Sebastian Faust
2013McBits: Fast Constant-Time Code-Based Cryptography.
Daniel J. Bernstein, Tung Chou, Peter Schwabe
2013Non-invasive Spoofing Attacks for Anti-lock Braking Systems.
Yasser Shoukry, Paul D. Martin, Paulo Tabuada, Mani B. Srivastava
2013On Measurable Side-Channel Leaks Inside ASIC Design Primitives.
Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino
2013On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs.
Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
2013On the Implementation of Unified Arithmetic on Binary Huff Curves.
Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede
2013On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme).
Amir Moradi, Oliver Mischke
2013Profiling DPA: Efficacy and Efficiency Trade-Offs.
Carolyn Whitnall, Elisabeth Oswald
2013Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID.
Peter Pessl, Michael Hutter
2013Sleuth: Automated Verification of Software Power Analysis Countermeasures.
Ali Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne
2013Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices.
Stefan Heyse, Ingo von Maurich, Tim Güneysu
2013Stealthy Dopant-Level Hardware Trojans.
Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
2013Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack.
Adrian Thillard, Emmanuel Prouff, Thomas Roche
2013Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA.
Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson