


default search action
12. CHES 2010: Santa Barbara, CA, USA
- Stefan Mangard, François-Xavier Standaert

:
Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings. Lecture Notes in Computer Science 6225, Springer 2010, ISBN 978-3-642-15030-2
Low Cost Cryptography
- Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia:

Quark: A Lightweight Hash. 1-15 - Lars R. Knudsen, Gregor Leander

, Axel Poschmann, Matthew J. B. Robshaw:
PRINTcipher: A Block Cipher for IC-Printing. 16-32 - Guido Bertoni

, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Sponge-Based Pseudo-Random Number Generators. 33-47
Efficient Implementations I
- Nicolas Guillermin:

A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over \mathbbFp\mathbb{F}_p. 48-64 - Raveen R. Goundar, Marc Joye, Atsuko Miyaji

:
Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract). 65-79 - Patrick Longa, Catherine H. Gebotys:

Efficient Techniques for High-Speed Elliptic Curve Cryptography. 80-94
Side-Channel Attacks and Countermeasures I
- Jean-Sébastien Coron, Ilya Kizhvatov:

Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. 95-109 - Onur Aciiçmez, Billy Bob Brumley

, Philipp Grabher:
New Results on Instruction Cache Attacks. 110-124 - Amir Moradi

, Oliver Mischke, Thomas Eisenbarth
:
Correlation-Enhanced Power Analysis Collision Attack. 125-139 - Olivier Benoît, Thomas Peyrin:

Side-Channel Analysis of Six SHA-3 Candidates. 140-157
Tamper Resistance and Hardware Trojans
- Sergei Skorobogatov:

Flash Memory 'Bumping' Attacks. 158-172 - Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia

:
Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection. 173-187 - Jerome Di-Battista, Jean-Christophe Courrège, Bruno Rouzeyre, Lionel Torres, Philippe Perdu:

When Failure Analysis Meets Side-Channel Attacks. 188-202
Efficient Implementations II
- Charles Bouillaguet

, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou
, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. 203-218 - Axel Poschmann, San Ling

, Huaxiong Wang:
256 Bit Standardized Crypto for 650 GE - GOST Revisited. 219-233 - Yasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa:

Mixed Bases for Efficient Inversion in \mathbb F((22)2) and Conversion Matrices of SubBytes of AES. 234-247
SHA-3
- Luca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, Frank K. Gürkaynak:

Developing a Hardware Evaluation Method for SHA-3 Candidates. 248-263 - Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski:

Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs. 264-278 - Joppe W. Bos, Deian Stefan:

Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures. 279-293 - Christian Wenzel-Benner, Jens Gräf:

XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework. 294-305
Fault Attacks and Countermeasures
- Alexandre Berzati, Cécile Canovas-Dumas

, Louis Goubin:
Public Key Perturbation of Randomized RSA Implementations. 306-319 - Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta:

Fault Sensitivity Analysis. 320-334
PUFs and RNGs
- Maximilian Hofer, Christoph Böhm:

An Alternative to Error Correction for SRAM-Like PUFs. 335-350 - Michal Varchola, Milos Drutarovský

:
New High Entropy Element for FPGA Based True Random Number Generators. 351-365 - Daisuke Suzuki, Koichi Shimizu:

The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes. 366-382
New Designs
- Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider

:
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version). 383-397 - Stéphane Badel, Nilay Dagtekin, Jorge Nakahara Jr., Khaled Ouafi, Nicolas Reffé, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay:

ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware. 398-412
Side-Channel Attacks and Countermeasures II
- Matthieu Rivain, Emmanuel Prouff:

Provably Secure Higher-Order Masking of AES. 413-427 - Yossef Oren

, Mario Kirschbaum, Thomas Popp, Avishai Wool
:
Algebraic Side-Channel Analysis in the Presence of Errors. 428-442 - Michael Tunstall

, Marc Joye:
Coordinate Blinding over Large Prime Fields. 443-455

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














