CHES A

34 papers

YearTitle / Authors
2014"Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way.
Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom
2014A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks.
Yossef Oren, Ofir Weisse, Avishai Wool
2014A Statistical Model for Higher Order DPA on Masked Devices.
A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo
2014Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM.
Daniel E. Holcomb, Kevin Fu
2014Cofactorization on Graphics Processing Units.
Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra
2014Compact Ring-LWE Cryptoprocessor.
Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede
2014Constructing S-boxes for Lightweight Cryptography with Feistel Structure.
Yongqiang Li, Mingsheng Wang
2014Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings
Lejla Batina, Matthew Robshaw
2014Curve41417: Karatsuba Revisited.
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
2014Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault Attacks.
Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
2014EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor.
Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki
2014Early Propagation and Imbalanced Routing, How to Diminish in FPGAs.
Amir Moradi, Vincent Immler
2014Efficient Pairings and ECC for Embedded Systems.
Thomas Unterluggauer, Erich Wenger
2014Efficient Power and Timing Side Channels for Physical Unclonable Functions.
Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Mehrdad Majzoobi, Farinaz Koushanfar, Wayne P. Burleson
2014Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG.
Viktor Fischer, David Lubicz
2014Enhanced Lattice-Based Signatures on Reconfigurable Hardware.
Thomas Pöppelmann, Léo Ducas, Tim Güneysu
2014Entropy Evaluation for Oscillator-Based True Random Number Generators.
Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing
2014FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison.
Khoongming Khoo, Thomas Peyrin, Axel York Poschmann, Huihui Yap
2014FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks.
Hai Brenner, Lubos Gaspar, Gaëtan Leurent, Alon Rosen, François-Xavier Standaert
2014Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures.
Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek
2014Gate-Level Masking under a Path-Based Leakage Metric.
Andrew J. Leiserson, Mark E. Marson, Megan A. Wachs
2014Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.
Daniel Genkin, Itamar Pipman, Eran Tromer
2014Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory.
Annelie Heuser, Olivier Rioul, Sylvain Guilley
2014How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.
Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
2014ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption.
Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wójcik
2014Making RSA-PSS Provably Secure against Non-random Faults.
Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2014Physical Characterization of Arbiter PUFs.
Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich
2014RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data.
Noboru Kunihiro, Junya Honda
2014Reversing Stealthy Dopant-Level Circuits.
Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino
2014Secure Conversion between Boolean and Arithmetic Masking of Any Order.
Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala
2014Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede
2014Side-Channel Attack against RSA Key Generation Algorithms.
Aurélie Bauer, Éliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche
2014Side-Channel Leakage through Static Power - Should We Care about in Practice?
Amir Moradi
2014Simple Power Analysis on AES Key Expansion Revisited.
Christophe Clavier, Damien Marion, Antoine Wurcker