CHES A

35 papers

YearTitle / Authors
2015A Masked Ring-LWE Implementation.
Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2015A Physical Approach for Stochastic Modeling of TERO-Based TRNG.
Patrick Haddad, Viktor Fischer, Florent Bernard, Jean Nicolai
2015Accelerating Homomorphic Evaluation on Reconfigurable Hardware.
Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrián Macías
2015Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware.
Yarkin Doröz, Erdinç Öztürk, Erkay Savas, Berk Sunar
2015Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads?
Amir Moradi, Alexander Wild
2015Blind Source Separation from Single Measurements Using Singular Spectrum Analysis.
Santos Merino Del Pozo, François-Xavier Standaert
2015Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings
Tim Güneysu, Helena Handschuh
2015DPA, Bitslicing and Masking at 1 GHz.
Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede
2015Efficient Ring-LWE Encryption on 8-Bit AVR Processors.
Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
2015End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol.
Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung
2015Evaluation and Improvement of Generic-Emulating DPA Attacks.
Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu
2015Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA.
Werner Schindler
2015Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast.
Christian Kison, Jürgen Frinken, Christof Paar
2015Highly Efficient GF(2
Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki
2015Improved Cryptanalysis of the DECT Standard Cipher.
Iwen Coisel, Ignacio Sánchez
2015Improved Side-Channel Analysis of Finite-Field Multiplication.
Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff
2015Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability.
Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay
2015Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations.
Tobias Schneider, Amir Moradi
2015Less is More - Dimensionality Reduction from a Theoretical Perspective.
Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul
2015Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates.
Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede
2015Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation.
Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede
2015Multi-variate High-Order Attacks of Shuffled Tables Recomputation.
Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia
2015NaCl's Crypto_box in Hardware.
Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser
2015Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits.
Aurélie Bauer, Damien Vergnaud
2015Predictive Models for Min-entropy Estimation.
John Kelsey, Kerry A. McKay, Meltem Sönmez Turan
2015Robust Profiling for DPA-Style Attacks.
Carolyn Whitnall, Elisabeth Oswald
2015Secure Key Generation from Biased PUFs.
Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems
2015Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC.
Karim Bigou, Arnaud Tisserand
2015SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip.
Jake Longo, Elke De Mulder, Dan Page, Michael Tunstall
2015Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation.
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
2015The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs.
Georg T. Becker
2015The Simeck Family of Lightweight Block Ciphers.
Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong
2015Transient-Steady Effect Attack on Block Ciphers.
Yanting Ren, An Wang, Liji Wu
2015TriviA: A Fast and Secure Authenticated Encryption Scheme.
Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
2015Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms.
Sarani Bhattacharya, Debdeep Mukhopadhyay