Skip to main content
main-content

Über dieses Buch

This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.

Inhaltsverzeichnis

Frontmatter

FPGA Implementation

2011 | OriginalPaper | Buchkapitel

An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension

Philipp Grabher, Johann Großschädl, Simon Hoerder, Kimmo Järvinen, Dan Page, Stefan Tillich, Marcin Wójcik

2011 | OriginalPaper | Buchkapitel

FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control

Mehrdad Majzoobi, Farinaz Koushanfar, Srinivas Devadas

2011 | OriginalPaper | Buchkapitel

Generic Side-Channel Countermeasures for Reconfigurable Devices

Tim Güneysu, Amir Moradi

AES

2011 | OriginalPaper | Buchkapitel

Improved Collision-Correlation Power Analysis on First Order Protected AES

Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil

2011 | OriginalPaper | Buchkapitel

Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols

Emmanuel Prouff, Thomas Roche

2011 | OriginalPaper | Buchkapitel

Protecting AES with Shamir’s Secret Sharing Scheme

Louis Goubin, Ange Martinelli

2011 | OriginalPaper | Buchkapitel

A Fast and Provably Secure Higher-Order Masking of AES S-Box

HeeSeok Kim, Seokhie Hong, Jongin Lim

Elliptic Curve Cryptosystems

2011 | OriginalPaper | Buchkapitel

Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication

Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López

2011 | OriginalPaper | Buchkapitel

High-Speed High-Security Signatures

Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang

2011 | OriginalPaper | Buchkapitel

To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order

Junfeng Fan, Benedikt Gierlichs, Frederik Vercauteren

Lattices

2011 | OriginalPaper | Buchkapitel

Random Sampling for Short Lattice Vectors on Graphics Cards

Michael Schneider, Norman Göttert

2011 | OriginalPaper | Buchkapitel

Extreme Enumeration on GPU and in Clouds

- How Many Dollars You Need to Break SVP Challenges -
Po-Chun Kuo, Michael Schneider, Özgür Dagdelen, Jan Reichelt, Johannes Buchmann, Chen-Mou Cheng, Bo-Yin Yang

2011 | OriginalPaper | Buchkapitel

Modulus Fault Attacks against RSA-CRT Signatures

Éric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi

Side Channel Attacks

2011 | OriginalPaper | Buchkapitel

Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World

David Oswald, Christof Paar

2011 | OriginalPaper | Buchkapitel

Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box

Mathieu Renauld, Dina Kamel, François-Xavier Standaert, Denis Flandre

2011 | OriginalPaper | Buchkapitel

Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings

Laurie Genelle, Emmanuel Prouff, Michaël Quisquater

2011 | OriginalPaper | Buchkapitel

Extractors against Side-Channel Attacks: Weak or Strong?

Marcel Medwed, François-Xavier Standaert

Invited Talk

2011 | OriginalPaper | Buchkapitel

Standardization Works for Security Regarding the Electromagnetic Environment

Tetsuya Tominaga

Fault Attacks

2011 | OriginalPaper | Buchkapitel

Meet-in-the-Middle and Impossible Differential Fault Analysis on AES

Patrick Derbez, Pierre-Alain Fouque, Delphine Leresteux

2011 | OriginalPaper | Buchkapitel

On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting

Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama

Lightweight Symmetric Algorithms

2011 | OriginalPaper | Buchkapitel

spongent: A Lightweight Hash Function

Andrey Bogdanov, Miroslav Knežević, Gregor Leander, Deniz Toz, Kerem Varıcı, Ingrid Verbauwhede

2011 | OriginalPaper | Buchkapitel

The LED Block Cipher

Jian Guo, Thomas Peyrin, Axel Poschmann, Matt Robshaw

2011 | OriginalPaper | Buchkapitel

Piccolo: An Ultra-Lightweight Blockcipher

Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, Taizo Shirai

PUFs

2011 | OriginalPaper | Buchkapitel

Lightweight and Secure PUF Key Storage Using Limits of Machine Learning

Meng-Day (Mandel) Yu, David M’Raihi, Richard Sowell, Srinivas Devadas

2011 | OriginalPaper | Buchkapitel

Recyclable PUFs: Logically Reconfigurable PUFs

Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann

2011 | OriginalPaper | Buchkapitel

Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches

Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, Kouichi Itoh

2011 | OriginalPaper | Buchkapitel

MECCA: A Robust Low-Overhead PUF Using Embedded Memory Array

Aswin Raghav Krishna, Seetharam Narasimhan, Xinmu Wang, Swarup Bhunia

Public-Key Cryptosystems

2011 | OriginalPaper | Buchkapitel

FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction

Ray C. C. Cheung, Sylvain Duquesne, Junfeng Fan, Nicolas Guillermin, Ingrid Verbauwhede, Gavin Xiaoxu Yao

2011 | OriginalPaper | Buchkapitel

High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields

Santosh Ghosh, Dipanwita Roychowdhury, Abhijit Das

2011 | OriginalPaper | Buchkapitel

Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors

Michael Hutter, Erich Wenger

2011 | OriginalPaper | Buchkapitel

Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key Systems

Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf

Hash Functions

2011 | OriginalPaper | Buchkapitel

Throughput vs. Area Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates Implemented Using Xilinx and Altera FPGAs

Ekawat Homsirikamol, Marcin Rogawski, Kris Gaj

2011 | OriginalPaper | Buchkapitel

Efficient Hashing Using the AES Instruction Set

Joppe W. Bos, Onur Özen, Martijn Stam

Backmatter

Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.

Whitepaper

- ANZEIGE -

Product Lifecycle Management im Konzernumfeld – Herausforderungen, Lösungsansätze und Handlungsempfehlungen

Für produzierende Unternehmen hat sich Product Lifecycle Management in den letzten Jahrzehnten in wachsendem Maße zu einem strategisch wichtigen Ansatz entwickelt. Forciert durch steigende Effektivitäts- und Effizienzanforderungen stellen viele Unternehmen ihre Product Lifecycle Management-Prozesse und -Informationssysteme auf den Prüfstand. Der vorliegende Beitrag beschreibt entlang eines etablierten Analyseframeworks Herausforderungen und Lösungsansätze im Product Lifecycle Management im Konzernumfeld.
Jetzt gratis downloaden!

Bildnachweise