Skip to main content
  • Conference proceedings
  • © 2013

Cryptographic Hardware and Embedded Systems -- CHES 2013

15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility
  • Includes supplementary material: sn.pub/extras

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8086)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CHES: International Conference on Cryptographic Hardware and Embedded Systems

Conference proceedings info: CHES 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Side-Channel Attacks

    1. Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack

      • Adrian Thillard, Emmanuel Prouff, Thomas Roche
      Pages 21-36
    2. Profiling DPA: Efficacy and Efficiency Trade-Offs

      • Carolyn Whitnall, Elisabeth Oswald
      Pages 37-54
    3. Non-invasive Spoofing Attacks for Anti-lock Braking Systems

      • Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani Srivastava
      Pages 55-72
  3. Physical Unclonable Function

    1. On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs

      • Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
      Pages 107-125
  4. Lightweight Cryptography

    1. Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

      • Begül Bilgin, Andrey Bogdanov, Miroslav Knežević, Florian Mendel, Qingju Wang
      Pages 142-158
  5. Hardware Implementations and Fault Attacks

    1. On Measurable Side-Channel Leaks Inside ASIC Design Primitives

      • Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino
      Pages 159-178
    2. A Very High Speed True Random Number Generator with Entropy Assessment

      • Abdelkarim Cherkaoui, Viktor Fischer, Laurent Fesquet, Alain Aubert
      Pages 179-196
    3. Stealthy Dopant-Level Hardware Trojans

      • Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
      Pages 197-214
    4. A Differential Fault Attack on MICKEY 2.0

      • Subhadeep Banik, Subhamoy Maitra
      Pages 215-232
  6. Efficient and Secure Implementations

    1. Improving Modular Inversion in RNS Using the Plus-Minus Method

      • Karim Bigou, Arnaud Tisserand
      Pages 233-249
    2. McBits: Fast Constant-Time Code-Based Cryptography

      • Daniel J. Bernstein, Tung Chou, Peter Schwabe
      Pages 250-272
    3. Sleuth: Automated Verification of Software Power Analysis Countermeasures

      • Ali Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne
      Pages 293-310
  7. Elliptic Curve Cryptography

    1. Lambda Coordinates for Binary Elliptic Curves

      • Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
      Pages 311-330
    2. High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition

      • Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
      Pages 331-348

Other Volumes

  1. Cryptographic Hardware and Embedded Systems - CHES 2013

About this book

This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.

Editors and Affiliations

  • STMicroelectronics, Belgium

    Guido Bertoni

  • University of Luxembourg, Luxembourg, Luxemburg

    Jean-Sébastien Coron

Bibliographic Information

  • Book Title: Cryptographic Hardware and Embedded Systems -- CHES 2013

  • Book Subtitle: 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings

  • Editors: Guido Bertoni, Jean-Sébastien Coron

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-40349-1

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: International Association for Cryptologic Research 2013

  • Softcover ISBN: 978-3-642-40348-4Published: 30 July 2013

  • eBook ISBN: 978-3-642-40349-1Published: 19 July 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 490

  • Number of Illustrations: 172 b/w illustrations

  • Topics: Cryptology, Systems and Data Security, Algorithm Analysis and Problem Complexity

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access