default search action
10. CHES 2008: Washington, D.C., USA
- Elisabeth Oswald, Pankaj Rohatgi:
Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings. Lecture Notes in Computer Science 5154, Springer 2008, ISBN 978-3-540-85052-6
Side-Channel Analysis 1
- Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain:
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. 1-14 - Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir:
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. 15-29 - Andrey Bogdanov:
Multiple-Differential Side-Channel Collision Attacks on AES. 30-44
Implementations 1
- Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf:
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?. 45-61 - Tim Güneysu, Christof Paar:
Ultra High Performance ECC over NIST Primes on Commercial FPGAs. 62-78 - Robert Szerwinski, Tim Güneysu:
Exploiting the Power of GPUs for Asymmetric Cryptography. 79-99
Fault Analysis 1
- Akashi Satoh, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki:
High-Performance Concurrent Error Detection Scheme for AES Hardware. 100-112 - Mehran Mozaffari Kermani, Arash Reyhani-Masoleh:
A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis. 113-129 - David Vigilant:
RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks. 130-145
Random Number Generation
- Wolfgang Killmann, Werner Schindler:
A Design for a Physical RNG with Robust Entropy Estimators. 146-163 - Ihor V. Vasyltsov, Eduard Hambardzumyan, Young-Sik Kim, Bohdan Karpinskyy:
Fast Digital TRNG Based on Metastable Ring Oscillator. 164-180 - Christoph Bösch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, Pim Tuyls:
Efficient Helper Data Key Extractor on FPGAs. 181-197
Side-Channel Analysis 2
- Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi:
The Carry Leakage on the Randomized Exponent Countermeasure. 198-213 - Colin D. Walter:
Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths. 214-227 - Stefan Tillich, Christoph Herbst:
Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. 228-243
Cryptography and Cryptanalysis
- Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi:
Binary Edwards Curves. 244-265 - Timo Gendrullis, Martin Novotný, Andy Rupp:
A Real-World Attack Breaking A5/1 within Hours. 266-282 - Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin:
Hash Functions and RFID Tags: Mind the Gap. 283-299
Implementations 2
- Arash Reyhani-Masoleh:
A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases. 300-314 - Dai Yamamoto, Jun Yajima, Kouichi Itoh:
A Very Compact Hardware Implementation of the MISTY1 Block Cipher. 315-330 - Philipp Grabher, Johann Großschädl, Dan Page:
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography. 331-345
Fault Analysis 2
- Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhede:
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration. 346-362 - Michael Hutter, Jörn-Marc Schmidt, Thomas Plos:
RFID and Its Vulnerability to Faults. 363-379 - Alexandre Berzati, Cécile Canovas, Louis Goubin:
Perturbating RSA Public Keys: An Improved Attack. 380-395
Side-Channel Analysis 3
- Karthik Baddam, Mark Zwolinski:
Divided Backend Duplication Methodology for Balanced Dual Rail Routing. 396-410 - François-Xavier Standaert, Cédric Archambeau:
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. 411-425 - Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel:
Mutual Information Analysis. 426-442
Invited Talks
- Adi Shamir:
RSA-Past, Present, Future. 443 - Ernie Brickell:
A Vision for Platform Security. 444
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.