Skip to main content
  • Conference proceedings
  • © 2014

Cryptographic Hardware and Embedded Systems -- CHES 2014

16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8731)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CHES: International Conference on Cryptographic Hardware and Embedded Systems

Conference proceedings info: CHES 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

  2. Side-Channel Attacks

    1. EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor

      • Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata et al.
      Pages 1-16
    2. How to Estimate the Success Rate of Higher-Order Side-Channel Attacks

      • Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
      Pages 35-54
    3. Good Is Not Good Enough

      • Annelie Heuser, Olivier Rioul, Sylvain Guilley
      Pages 55-74
  3. New Attacks and Constructions

    1. “Ooh Aah... Just a Little Bit” : A Small Amount of Side Channel Can Go a Long Way

      • Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom
      Pages 75-92
    2. Destroying Fault Invariant with Randomization

      • Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
      Pages 93-111
    3. Reversing Stealthy Dopant-Level Circuits

      • Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki et al.
      Pages 112-126
  4. Countermeasures

    1. A Statistical Model for Higher Order DPA on Masked Devices

      • A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo
      Pages 147-169
    2. Secure Conversion between Boolean and Arithmetic Masking of Any Order

      • Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala
      Pages 188-205
    3. Making RSA–PSS Provably Secure against Non-random Faults

      • Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz
      Pages 206-222
  5. Algorithm Specific SCA

    1. Side-Channel Attack against RSA Key Generation Algorithms

      • Aurélie Bauer, Eliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche
      Pages 223-241
    2. Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs

      • Daniel Genkin, Itamar Pipman, Eran Tromer
      Pages 242-260
    3. RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data

      • Noboru Kunihiro, Junya Honda
      Pages 261-278
    4. Simple Power Analysis on AES Key Expansion Revisited

      • Christophe Clavier, Damien Marion, Antoine Wurcker
      Pages 279-297
  6. ECC Implementations

    1. Efficient Pairings and ECC for Embedded Systems

      • Thomas Unterluggauer, Erich Wenger
      Pages 298-315
    2. Curve41417: Karatsuba Revisited

      • Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
      Pages 316-334
  7. Implementations

    1. Cofactorization on Graphics Processing Units

      • Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra
      Pages 335-352

Other Volumes

  1. Cryptographic Hardware and Embedded Systems – CHES 2014

About this book

This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.

Editors and Affiliations

  • FNWI-iCIS/DS, Radboud University Nijmegen, Nijmegen, The Netherlands

    Lejla Batina

  • Impinj, Inc., Seattle, USA

    Matthew Robshaw

Bibliographic Information

  • Book Title: Cryptographic Hardware and Embedded Systems -- CHES 2014

  • Book Subtitle: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings

  • Editors: Lejla Batina, Matthew Robshaw

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-662-44709-3

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: International Association for Cryptologic Research 2014

  • Softcover ISBN: 978-3-662-44708-6Published: 22 September 2014

  • eBook ISBN: 978-3-662-44709-3Published: 12 September 2014

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 618

  • Number of Illustrations: 192 b/w illustrations

  • Topics: Cryptology, Systems and Data Security, Special Purpose and Application-Based Systems

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access