Issue 1/2014
CHES 2013
Content (6 Articles)
CHES 2013
Two is the fastest prime: lambda coordinates for binary elliptic curves
Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
CHES 2013
Stealthy dopant-level hardware Trojans: extended version
Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
CHES 2013
Using Bleichenbacher’s solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version
Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson
CHES 2013
Masking vs. multiparty computation: how large is the gap for AES?
Vincent Grosso, François-Xavier Standaert, Sebastian Faust
CHES 2013
On measurable side-channel leaks inside ASIC design primitives
Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino