Skip to main content
  • Conference proceedings
  • © 2010

Cryptographic Hardware and Embedded Systems -- CHES 2010

12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings

  • Up to date results
  • Fast conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6225)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CHES: International Conference on Cryptographic Hardware and Embedded Systems

Conference proceedings info: CHES 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

  2. Low Cost Cryptography

    1. Quark: A Lightweight Hash

      • Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia
      Pages 1-15
    2. PRINTcipher: A Block Cipher for IC-Printing

      • Lars Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw
      Pages 16-32
    3. Sponge-Based Pseudo-Random Number Generators

      • Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
      Pages 33-47
  3. Efficient Implementations I

    1. Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves

      • Raveen R. Goundar, Marc Joye, Atsuko Miyaji
      Pages 65-79
    2. Efficient Techniques for High-Speed Elliptic Curve Cryptography

      • Patrick Longa, Catherine Gebotys
      Pages 80-94
  4. Side-Channel Attacks and Countermeasures I

    1. Analysis and Improvement of the Random Delay Countermeasure of CHES 2009

      • Jean-Sébastien Coron, Ilya Kizhvatov
      Pages 95-109
    2. New Results on Instruction Cache Attacks

      • Onur Acıiçmez, Billy Bob Brumley, Philipp Grabher
      Pages 110-124
    3. Correlation-Enhanced Power Analysis Collision Attack

      • Amir Moradi, Oliver Mischke, Thomas Eisenbarth
      Pages 125-139
    4. Side-Channel Analysis of Six SHA-3 Candidates

      • Olivier Benoît, Thomas Peyrin
      Pages 140-157
  5. Tamper Resistance and Hardware Trojans

    1. Flash Memory ‘Bumping’ Attacks

      • Sergei Skorobogatov
      Pages 158-172
    2. Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection

      • Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia
      Pages 173-187
    3. When Failure Analysis Meets Side-Channel Attacks

      • Jerome Di-Battista, Jean-Christophe Courrege, Bruno Rouzeyre, Lionel Torres, Philippe Perdu
      Pages 188-202
  6. Efficient Implementations II

    1. Fast Exhaustive Search for Polynomial Systems in \({\mathbb{F}_2}\)

      • Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir et al.
      Pages 203-218
    2. 256 Bit Standardized Crypto for 650 GE – GOST Revisited

      • Axel Poschmann, San Ling, Huaxiong Wang
      Pages 219-233
    3. Mixed Bases for Efficient Inversion in \({{\mathbb F}{((2^2)^2)}{2}}\) and Conversion Matrices of SubBytes of AES

      • Yasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa
      Pages 234-247
  7. SHA-3

    1. Developing a Hardware Evaluation Method for SHA-3 Candidates

      • Luca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, Frank K. Gürkaynak
      Pages 248-263

Other Volumes

  1. Cryptographic Hardware and Embedded Systems, CHES 2010

Editors and Affiliations

  • Infineon Technologies, Security Innovation, Neubiberg, Germany

    Stefan Mangard

  • UCL Crypto Group, Université catholique de Louvain, Louvain-la-Neuve, Belgium

    François-Xavier Standaert

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access