CHES 2016:
Benedikt Gierlichs and Axel Y. Poschmann (Eds.):
Cryptographic Hardware and Embedded Systems
CHES 2016 - 18th International Conference,
Santa Barbara, CA, USA,
August 17-19, 2016
Proceedings.
CHES 2016
Organizational Committee
Program Chairs : | Benedikt Gierlichs and Axel Y. Poschmann | |
General Chair : | Erkay Savas and Çetin Kaya Koç |
Program Committee
Josep Balasch |
Lejla Batina |
Daniel J. Bernstein |
Guido Bertoni |
Chen-Mou Cheng |
Orr Dunkelman |
Junfeng Fan |
Sebastian Faust |
Viktor Fischer |
Wieland Fischer |
Henri Gilbert |
Christophe Giraud |
Daniel E. Holcomb |
Naofumi Homma |
Michael Hutter |
Kimmo U. Järvinen |
Marc Joye |
Lars R. Knudsen |
Kerstin Lemke-Rust |
Tancrède Lepoint |
Roel Maes |
Mitsuru Matsui |
Marcel Medwed |
Amir Moradi |
Debdeep Mukhopadhyay |
Elke De Mulder |
David Naccache |
Elisabeth Oswald |
Dan Page |
Thomas Peyrin |
Emmanuel Prouff |
Francesco Regazzoni |
Matthieu Rivain |
Alexander Schlösser |
Sergei P. Skorobogatov |
Berk Sunar |
Mehdi Tibouchi |
Steven Trimberger |
Meltem Sönmez Turan |
Ingrid Verbauwhede |
André Weimerskirch |
Brecht Wyseur |
External Referees
-
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation
, 3-22,
Sylvain Guilley
,
Jean-Luc Danger
,
Olivier Rioul
,
Margaux Dugardin
,
Zakaria Najm
bib info -
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
, 23-39,
Jean-Sébastien Coron
,
Emmanuel Prouff
,
Alberto Battistello
,
Rina Zeitoun
bib info -
Towards Easy Leakage Certification
, 40-60,
François-Xavier Standaert
,
François Durvaux
,
Santos Merino Del Pozo
bib info -
Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach
, 61-81,
François-Xavier Standaert
,
Vincent Grosso
,
Romain Poussier
bib info
-
Strong 8-bit Sboxes with Efficient Masking in Hardware
, 171-193,
Gregor Leander
,
Amir Moradi
,
Tim Güneysu
,
Vincent Grosso
,
Tobias Schneider
,
Erik Boss
bib info -
Masking AES with d+1 Shares in Hardware
, 194-212,
Vincent Rijmen
,
Ventzislav Nikov
,
Svetla Nikova
,
Oscar Reparaz
,
Begül Bilgin
,
Thomas De Cnudde
bib info
-
Software Implementation of Koblitz Curves over Quadratic Fields
, 259-279,
Francisco Rodríguez-Henríquez
,
Thomaz Oliveira
,
Julio López
bib info -
QcBits: Constant-Time Small-Key Code-Based Cryptography
, 280-300,
Tung Chou
bib info -
μKummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers
, 301-320,
Lejla Batina
,
Benjamin Smith
,
Peter Schwabe
,
Joost Renes
bib info
-
Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme
, 323-345,
Tanja Lange
,
Yuval Yarom
,
Andreas Hülsing
,
Leon Groot Bruinderink
bib info -
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
, 346-367,
Nadia Heninger
,
Daniel Genkin
,
Yuval Yarom
bib info -
Cache Attacks Enable Bulk Key Recovery on the Cloud
, 368-388,
Berk Sunar
,
Thomas Eisenbarth
,
Mehmet Sinan Inci
,
Berk Gülmezoglu
,
Gorka Irazoqui
bib info
-
Strong Machine Learning Attack Against PUFs with No Mathematical Model
, 391-411,
Jean-Pierre Seifert
,
Fatemeh Ganji
,
Shahin Tajik
,
Fabian Fäßler
bib info -
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
, 412-431,
Ingrid Verbauwhede
,
Dawu Gu
,
Meng-Day (Mandel) Yu
,
Jeroen Delvaux
,
Matthias Hiller
bib info -
Run-Time Accessible DRAM PUFs in Commodity Devices
, 432-453,
Stefan Katzenbeisser
,
Wenjie Xiong
,
André Schaller
,
Nikolaos Anagnostopoulos
,
Muhammad Umair Saleem
,
Sebastian Gabmeyer
,
Jakub Szefer
bib info
-
Reducing the Number of Non-linear Multiplications in Masking Schemes
, 479-497,
Jürgen Pulkus
,
Srinivas Vivek
bib info -
Reducing the Number of Non-linear Multiplications in Masking Schemes
, 479-497,
Jürgen Pulkus
,
Srinivas Vivek
bib info -
Faster Evaluation of SBoxes via Common Shares
, 498-514,
Jean-Sébastien Coron
,
Emmanuel Prouff
,
Rina Zeitoun
,
Aurélien Greuet
bib info
-
Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields
, 517-537,
Kimmo U. Järvinen
,
Patrick Longa
,
Andrea Miele
,
Reza Azarderakhsh
bib info -
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation
, 538-558,
Sumio Morioka
,
Naofumi Homma
,
Takafumi Aoki
,
Rei Ueno
bib info -
Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering
, 559-577,
Markus Kammerstetter
,
Markus Muellner
,
Daniel Burian
,
Christian Kudera
,
Wolfgang Kastner
bib info
-
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
, 581-601,
Dipanwita Roy Chowdhury
,
Dhiman Saha
bib info -
Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis
, 602-624,
Debdeep Mukhopadhyay
,
Sarani Bhattacharya
bib info -
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
, 457-478,
Matthieu Rivain
,
Dahmun Goudarzi
bib info -
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
, 625-647,
Christof Paar
,
Georg T. Becker
,
Daniel E. Holcomb
,
Samaneh Ghandali
bib info
Author Index