Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings
Page
Title
1-17
Faster and Timing-Attack Resistant AES-GCM
18-32
Accelerating AES with Vector Permute Instructions
33-48
SSE Implementation of Multivariate PKCs on Modern x86 CPUs
49-64
MicroEliece: McEliece for Embedded Devices
65
Physical Unclonable Functions and Secure Processors
66-80
Practical Electromagnetic Template Attack on HMAC
81-96
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
97-111
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
112-127
Differential Cluster Analysis
128-140
Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication
141-155
A New Side-Channel Attack on RSA Prime Generation
156-170
An Efficient Method for Random Delay Generation in Embedded Software
171-188
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
189-204
A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques
205-219
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
220-224
Crypto Engineering: Some History and Some Case Studies
225-239
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers
240-253
Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves
254-271
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
272-288
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers
289-303
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
304-316
Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases
317-331
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators
332-347
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs
348-362
CDs Have Fingerprints Too
363-381
The State-of-the-Art in IC Reverse Engineering
382-395
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
396-410
MERO: A Statistical Approach for Hardware Trojan Detection
411-428
On Tamper-Resistance from a Theoretical Viewpoint
429-443
Mutual Information Analysis: How, When and Why?
444-456
Fault Attacks on RSA Signatures with Partially Unknown Messages
457-469
Differential Fault Analysis on DES Middle Rounds