default search action
19. CHES 2017: Taipei, Taiwan
- Wieland Fischer, Naofumi Homma:
Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Lecture Notes in Computer Science 10529, Springer 2017, ISBN 978-3-319-66786-7
Side Channel Analysis I
- Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson:
A Side-Channel Assisted Cryptanalytic Attack Against QcBits. 3-23 - Christophe Clavier, Léo Reynaud:
Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages. 24-44 - Eleonora Cagli, Cécile Dumas, Emmanuel Prouff:
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing. 45-68 - Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth:
CacheZoom: How SGX Amplifies the Power of Cache Attacks. 69-90
Higher Order Countermeasures
- Jean-Sébastien Coron:
High-Order Conversion from Boolean to Arithmetic Masking. 93-114 - Hannes Groß, Stefan Mangard:
Reconciling d+1 Masking in Hardware and Software. 115-136 - Joan Daemen:
Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing. 137-153 - Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek:
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures. 154-171
Emerging Attacks I
- Stéphanie Anceau, Pierre Bleuet, Jessy Clédière, Laurent Maingault, Jean-Luc Rainard, Rémi Tucoulou:
Nanofocused X-Ray Beam to Reprogram Secure Circuits. 175-188 - Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte:
Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks. 189-210
Post Quantum Implementations
- Tung Chou:
McBits Revisited. 213-231 - Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe:
High-Speed Key Encapsulation from NTRU. 232-252 - Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes. 253-274
Cipher & Protocol Design
- Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-Based Authenticated Encryption: How Small Can We Go? 277-298 - Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli : A Cross-Platform Permutation. 299-320 - Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. 321-345 - Björn Haase, Benoît Labrique:
Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices. 346-364
Security Evaluation
- Marios O. Choudary, Pantelimon George Popescu:
Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools. 367-386 - Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede:
Fast Leakage Assessment. 387-399
FPGA Security
- Vincent Immler, Robert Specht, Florian Unterstein:
Your Rails Cannot Hide from Localized EM: How Dual-Rail Logic Fails on FPGAs. 403-424 - Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl:
How to Break Secure Boot on FPGA SoCs Through Malicious Hardware. 425-442
Emerging Attacks II
- Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim:
Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications. 445-467 - Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. 468-489 - Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-Based Ranging. 490-509
Side Channel Analysis II
- Robert Primas, Peter Pessl, Stefan Mangard:
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption. 513-533 - Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert:
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks. 534-554 - Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom:
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak. 555-576
Encoding Techniques
- Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:
Faster Homomorphic Function Evaluation Using Non-integral Base Encoding. 579-600 - Matthias Hiller, Aysun Gurur Önalan:
Hiding Secrecy Leakage in Leaky Helper Data. 601-619
Efficient Implementations
- Anthony Journault, François-Xavier Standaert:
Very High Order Masking: Efficient Implementation and Security Evaluation. 623-643 - Tiago B. S. Reis, Diego F. Aranha, Julio López:
PRESENT Runs Fast - Efficient and Secure Implementation in Software. 644-664 - Zhe Liu, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo:
Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. 665-686 - Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich:
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY. 687-707
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.