CHES 2012
9 - 12 September
Leuven, Belgium
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012)

CHES 2012

List of accepted papers

1. 3D Hardware Canaries
Sebastien Briais (Secure-IC), Stéphane Caron (Ecole Normale Superieure),
Jean-Michel Cioranesco (Universite Paris 2), Jean-Luc Danger (TELECOM-ParisTech), Sylvain Guilley (TELECOM-ParisTech),
Jacques-Henri Jourdan (Ecole Normale Superieure), Arthur Milchior
(Ecole Normale Superieure), David Naccache (Ecole Normale Superieure),
Thibault PorteBoeuf (Secure-IC)

2. A Differential Fault Attack on the Grain Family of Stream Ciphers
Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar (Indian Statistical Institute)

3. A statistical model for DPA with novel algorithmic confusion analysis
Yunsi Fei (Electrical and Computer Engineering Department,
Northeastern University, Boston, USA), Qiasi Luo (Marvell Technology,
Santa Clara, USA) and A. Adam Ding (Department of Mathematics,
Northeastern University, Boston, USA)

4. An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor
Jen-Wei Lee , Szu-Chi Chung, Hsie-Chia Chang, Chen-Yi Lee (National
Chiao Tung University, Taiwan)

5. Algebraic Side-Channel Analysis Beyond the Hamming Weight Leakage Model
Yossef Oren (Tel Aviv University, Israel), Mathieu Renauld (UCL Crypto
Group, Belgium, François-Xavier Standaert (UCL Crypto Group, Belgium)
and Avishai Wool (Tel Aviv University, Israel)

6. Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
Pierre-Alain Fouque (ENS / INRIA Rennes), Nicolas Guillermin (DGA IS),
Delphine Leresteux (DGA IS), Mehdi Tibouchi (NTT Secure Platform
Laboratories), Jean-Christophe Zapalowicz (INRIA Rennes)

7. Breakthrough silicon scanning discovers backdoor in military chip
Sergei Skorobogatov (University of Cambridge, UK), Christopher Woods
(Quo Vadis Labs, UK)

8. Compiler assisted masking
Andrew Moss (Blekinge Institute of Technology, Sweden), Elisabeth
Oswald (University of Bristol, UK), Dan Page (University of Bristol,
UK), Michael Tunstall (University of Bristol, UK)

9. Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking
Blandine Debraize (Gemalto)

10. Efficient Implementations of MQPKS on Constrained Devices
Peter Czypek and Stefan Heyse and Enrico Thomae (Horst Görtz Institute
for IT Security, Ruhr University Bochum, Germany)

11. How Far Should Theory be from Practice? Evaluation of a Countermeasure
Amir Moradi, Oliver Mischke (Ruhr University Bochum, Germany)

12. Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation
Seiichi Matsuda (Sony Corporation), Shiho Moriai (NICT)

13. Low-Latency Encryption - Is "Lightweight = Light + Wait"?
Miroslav Knežević, Ventzislav Nikov, Peter Rombouts (NXP Semiconductors)

14. Selecting Time Samples for Multivariate DPA Attacks
Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven, Belgium)

15. NEON crypto
Daniel J. Bernstein and Peter Schwabe (University of Illinois at
Chicago and Academia Sinica)

16. On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
Norman Göttert, Thomas Feller, Michael Schneider, Sorin A. Huss,
Johannes Buchmann (CASED, TU Darmstadt, Germany)

17. Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware
Stefan Heyse and Tim Güneysu (Horst Görtz Institute for IT Security ,
Ruhr University)

18. Practical Lattice-based Cryptography: A Signature Scheme for Embedded Systems
Tim Güneysu (Ruhr University Bochum, Germany), Vadim Lyubashevsky
(INRIA / ENS Paris), Thomas Pöppelmann (Ruhr University Bochum,
Germany)

19. Practical Leakage-Resilient Symmetric Cryptography
Sebastian Faust (Aarhus University), Krzysztof Pietrzak (IST Austria)
and Joachim Schipper (IST Austria)

20. Practical Security Analysis of PUF-based Two-Player Protocols
Ulrich Rührmair (TU München) and Marten van Dijk (RSA Laboratories)

21. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Poured in Silicon
Stefan Katzenbeisser (CASED, TU Darmstadt, Germany), Ünal Kocabas
(CASED, TU Darmstadt, Germany), Vladimir Rozic (KU Leuven, Belgium),
Ahmad-Reza Sadeghi (TU Darmstadt, Germany), Ingrid Verbauwhede (KU
Leuven, Belgium), Christian Wachsmann (CASED, TU Darmstadt, Germany)

22. PUFKY: A Fully Functional PUF-based Cryptographic Key Generator
Roel Maes and Anthony Van Herrewege and Ingrid Verbauwhede
(ESAT-COSIC, KULeuven and IBBT, Belgium)

23. Pushing the Limits of High-Speed GF(2^m) Elliptic Curve Scalar Multiplication on FPGAs
Chester Rebeiro, Sujoy Sinha Roy, Debdeep Mukhopadhyay (Indian
Institute of Technology Kharagpur, India)

24. Reduce-by-Feedback: Timing resistant and DPA-aware Modular Multiplication, plus: How to Break RSA by DPA
Michael Vielhaber (Hochschule Bremerhaven, Germany)

25. Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
Santanu Sarkar, Subhamoy Maitra (Indian Statistical Institute)

26. Simple Photonic Emission Analysis of AES
Alexander Schloesser (1), Dmitry Nedospasov (2), Juliane Kraemer (2),
Susanna Orlic (1), Jean-Pierre Seifert (2)
(1) Institute of Optics and Atomic Physics, TU Berlin, Germany
(2) Dept. of Software Engineering and Theoretical Computer Science, TU
Berlin, Germany

27. Soft Decision Error Correction for Compact Memory-Based PUFs
Vincent van der Leest (Intrinsic-ID), Bart Preneel (KU Leuven and
IBBT), Erik van der Sluis (Intrinsic-ID)

28. Solving Quadratic Equations with XL on Parallel Architectures
Tung Chou (Academia Sinica, Taiwan), Chen-Mou Cheng (National Taiwan
University, and the Intel Connected Context Computing Center,
Taiwan), Ruben Niederhagen (Eindhoven University of Technology, the
Netherlands, and Academia Sinica, Taiwan), Bo-Yin Yang (Academia
Sinica, Taiwan)

29. Towards Green Cryptography: a Comparison of Lightweight Ciphers
from the Energy Viewpoint

Stéphanie Kerckhof, François Durvaux, Cédric Hocquet, David Bol,
François-Xavier Standaert (UCL Crypto Group)

30. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
Marcel Medwed (UCL Crypto Group, Belgium), Francois-Xavier Standaert
(UCL Crypto Group, Belgium), Antoine Joux (Université de Versailles,
France)

31. Threshold Implementations of all 3x3 and 4x4 S-boxes
Begul Bilgin (KU Leuven, Belgium), Svetla Nikova (KU Leuven,
Belgium), Ventzislav Nikov (NXP Semiconductors) and Vincent Rijmen
(KU Leuven, Belgium and TU Gratz, Austria) and G.Stütz (TU Graz, Austria)

32. Unified and Optimized Linear Collision Attacks and Their Application in a Non-Profiled Setting
Benoît Gérard, François-Xavier Standaert (UCL Crypto Group, Belgium)


© 2014 KU Leuven ESAT/SCD - COSIC
Production: COSIC Webteam | Disclaimer
Last modified on 2012/06/22 13:35