Skip to main content
  • Conference proceedings
  • © 2009

Cryptographic Hardware and Embedded Systems - CHES 2009

11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5747)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CHES: International Conference on Cryptographic Hardware and Embedded Systems

Conference proceedings info: CHES 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

  2. Software Implementations

    1. Faster and Timing-Attack Resistant AES-GCM

      • Emilia Käsper, Peter Schwabe
      Pages 1-17
    2. SSE Implementation of Multivariate PKCs on Modern x86 CPUs

      • Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo et al.
      Pages 33-48
    3. MicroEliece: McEliece for Embedded Devices

      • Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, Christof Paar
      Pages 49-64
  3. Invited Talk 1

  4. Side Channel Analysis of Secret Key Cryptosystems

    1. Practical Electromagnetic Template Attack on HMAC

      • Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette
      Pages 66-80
    2. Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA

      • Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon
      Pages 97-111
    3. Differential Cluster Analysis

      • Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust
      Pages 112-127
  5. Side Channel Analysis of Public Key Cryptosystems

    1. A New Side-Channel Attack on RSA Prime Generation

      • Thomas Finke, Max Gebhardt, Werner Schindler
      Pages 141-155
  6. Side Channel and Fault Analysis Countermeasures

    1. An Efficient Method for Random Delay Generation in Embedded Software

      • Jean-Sébastien Coron, Ilya Kizhvatov
      Pages 156-170
    2. Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers

      • Matthieu Rivain, Emmanuel Prouff, Julien Doget
      Pages 171-188
    3. A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques

      • Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh
      Pages 189-204
    4. A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions

      • Francesco Regazzoni, Alessandro Cevrero, François-Xavier Standaert, Stephane Badel, Theo Kluter, Philip Brisk et al.
      Pages 205-219
  7. Invited Talk 2

  8. Pairing-Based Cryptography

    1. Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers

      • Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
      Pages 225-239
    2. Faster \(\mathbb{F}_p\)-Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves

      • Junfeng Fan, Frederik Vercauteren, Ingrid Verbauwhede
      Pages 240-253
    3. Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves

      • David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwaechter, Markus Langenberg, Dominik Auras et al.
      Pages 254-271

Other Volumes

  1. Cryptographic Hardware and Embedded Systems - CHES 2009

About this book

CHES 2009, the 11th workshop on Cryptographic Hardware and Embedded Systems, was held in Lausanne, Switzerland, September 6–9, 2009. The wo- shop was sponsored by the International Association for Cryptologic Research (IACR). The workshop attracted a record number of 148 submissions from 29 co- tries, of which the Program Committee selected 29 for publication in the wo- shop proceedings, resulting in an acceptance rate of 19.6%, the lowest in the history of CHES. The review process followed strict standards: each paper - ceived at least four reviews, and some asmanyaseightreviews.Membersofthe Program Committee were restricted to co-authoring at most two submissions, and their papers were evaluated by an extended number of reviewers. The ProgramCommittee included 53 members representing 20 countries and ?ve continents. These members were carefully selected to represent academia, industry, and government, as well as to include world-class experts in various research ?elds of interest toCHES. The Program Committee was supported by 148 external reviewers. The total number of people contributing to the - view process, including Program Committee members, external reviewers, and Program Co-chairs, exceeded 200. The papers collected in this volume represent cutting-edge worldwide - search in the rapidly growing and evolving area of cryptographic engineering.

Editors and Affiliations

  • Département de Mathématiques et d’Informatique, Université de Limoges, Limoges, France

    Christophe Clavier

  • ECE Department, George Mason University, Fairfax, USA

    Kris Gaj

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access