CHES 2014 Sept. 23, 2014 to Sept. 26, 2014, busan,korea

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keccak and SHA-3 Guido Bertoni N/A
Random number generators for cryptography — design, evaluation and tests Viktor Fischer N/A
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor Yu-ichi Hayashi , Noriyuki Miura , Daisuke Fujimoto , Daichi Tanaka , Makoto Nagata , Takafumi Aoki N/A
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks Avishai Wool , Yossef Oren , Ofir Weisse N/A
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks Thomas Roche , Victor Lomné , Emmanuel Prouff , Matthieu Rivain , Adrian Thillard N/A
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory Sylvain Guilley , Annelie Heuser , Olivier Rioul N/A
"Ooh Aah... Just a Little Bit"': A small amount of side channel can go a long way Nigel P. Smart , Yuval Yarom , Joop Pol N/A
Destroying Fault Invariant with Randomization - A Countermeasure for AES against Differential Fault Attacks Debdeep Mukhopadhyay , Harshal Tupsamudre , Shikha Bisht N/A
Reversing Stealthy Dopant-Level Circuits Takeshi Sugawara , Daisuke Suzuki , Ryoichi Fujii , Shigeaki Tawa , Ryohei Hori , Mitsuru Shiozaki , Takeshi Fujino N/A
Constructing S-boxes for Lightweight Cryptography with Feistel Structure Mingsheng Wang , Yongqiang Li N/A
A Statistical Model for Higher Order DPA on Masked Devices Pei Luo , Adam Ding , Liwei Zhang , Yunsi Fei N/A
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures Arnab Roy , Jean-sebastien Coron , Srinivas Vivek N/A
Secure Conversion between Boolean and Arithmetic Masking of any order Johann Großschädl , Jean-sebastien Coron , Praveen Kumar Vadnala N/A
Making RSA-PSS Provably Secure Against Non-Random Faults Pierre-alain Fouque , Gilles Barthe , Mehdi Tibouchi , François Dupressoir , Benjamin Grégoire , Jean-christophe Zapalowicz N/A
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs Daniel Genkin , Eran Tromer , Itamar Pipman N/A
Side-Channel Attack Against RSA Key Generation Algorithms Thomas Roche , Victor Lomné , Emmanuel Prouff , Aurélie Bauer , Eliane Jaulmes N/A
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data Noboru Kunihiro , Junya Honda N/A
Simple Power Analysis on AES Key Expansion Revisited Christophe Clavier , Damien Marion , Antoine Wurcker N/A
Efficient Pairings and ECC for Embedded Systems Erich Wenger , Thomas Unterluggauer N/A
Curve41417: Karatsuba revisited Daniel J. Bernstein , Tanja Lange , Chitchanok Chuengsatiansup N/A
V2V Communication Security: a privacy-preserving design for 300 million vehicles André Weimerskirch N/A
Cofactorization on Graphics Processing Units Joppe w. Bos , Thorsten Kleinjung , Andrea Miele , Arjen K. Lenstra N/A
Enhanced Lattice-Based Signatures on Reconfigurable Hardware Leo Ducas , Thomas Pöppelmann , Tim Güneysu N/A
Compact Ring-LWE based Cryptoprocessor Ingrid Verbauwhede , Sujoy Sinha Roy , Frederik Vercauteren , Nele Mentens , Donald Donglong Chen N/A
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption Marcin Wojcik , Pawel Morawiecki , Marian Srebrny , Ekawat Homsirikamol , Marcin Rogawski , Kris Gaj , Krystian Matusiewicz , Josef Pieprzyk N/A
FPGA implementations of SPRING (And their Countermeasures against Side-Channel Attacks) Gaetan Leurent , Francois-xavier Standaert , Lubos Gaspar , Hai Brenner , Alon Rosen N/A
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison Thomas Peyrin , Khoongming Khoo , Axel Poschmann , Huihui Yap N/A
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? Ingrid Verbauwhede , Dawu Gu , Jeroen Delvaux , Dries Schellekens N/A
Efficient Power and Timing Side Channels for Physical Unclonable Functions Farinaz Koushanfar , Wayne p. Burleson , Ulrich Rührmair , Xiaolin Xu , Jan Sölter , Ahmed Mahmoud , Mehrdad Majzoobi N/A
Physical Characterization of Arbiter PUFs Dmitry Nedospasov , Jean-pierre Seifert , Shahin Tajik , Enrico Dietz , Sven Frohmann , Clemens Helfmeier , Christian Boit , Helmar Dittrich N/A
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM Kevin Fu , Daniel E. Holcomb N/A
Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG Viktor Fischer , David Lubicz N/A
Entropy Evaluation for Oscillator-Based True Random Number Generators Jingqiang Lin , Jiwu Jing , Yuan Ma , Tianyu Chen , Changwei Xu , Zongbin Liu N/A
Side-Channel Leakage through Static Power — Should We Care about in Practice? Amir Moradi N/A
Gate-Level Masking Under a Path-Based Leakage Metric Andrew J. Leiserson , Mark E. Marson , Megan A. Wachs N/A