Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of ches 2013
Page
Title
1-20
On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme)
21-36
Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
37-54
Profiling DPA: Efficacy and Efficiency Trade-Offs
55-72
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
73-89
An Accurate Probabilistic Reliability Model for Silicon PUFs
90-106
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
107-125
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs
126-141
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID
142-158
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
159-178
On Measurable Side-Channel Leaks Inside ASIC Design Primitives
179-196
A Very High Speed True Random Number Generator with Entropy Assessment
197-214
Stealthy Dopant-Level Hardware Trojans
215-232
A Differential Fault Attack on MICKEY 2.0
233-249
Improving Modular Inversion in RNS Using the Plus-Minus Method
250-272
McBits: Fast Constant-Time Code-Based Cryptography
273-292
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
293-310
Sleuth: Automated Verification of Software Power Analysis Countermeasures
311-330
Lambda Coordinates for Binary Elliptic Curves
331-348
High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition
349-364
On the Implementation of Unified Arithmetic on Binary Huff Curves
365-382
Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults
383-399
Block Ciphers That Are Easier to Mask: How Far Can We Go?
400-416
Masking vs. Multiparty Computation: How Large Is the Gap for AES?
417-434
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
435-452
Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
453-470
A New Model for Error-Tolerant Side-Channel Cube Attacks
471-488
Leakage-Resilient Symmetric Encryption via Re-keying