Workshop on Cryptographic Hardware and Embedded Systems 2013 (CHES 2013)

Santa Barbara, California, USA
Tuesday August 20th - Friday August 23rd 2013

List of Accepted Papers

1. Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA.
Elke De Mulder (Cryptography Research), Michael Hutter (Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria), Mark E. Marson (Cryptography Research), Peter Pearson (Cryptography Research)

2. A Differential Fault Attack on MICKEY 2.0
Subhadeep Banik and Subhamoy Maitra (Applied Statistics Unit, Indian Statistical Institute, India)

3. Noninvasive Spoofing Attacks For Anti-lock Braking Systems
Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani Srivastava (UC Los Angeles)

4. Lambda coordinates for binary elliptic curves
Thomaz Oliveira (CINVESTAV-IPN, Mexico), Julio Lopez (University of Campinas, Brazil), Diego F. Aranha (University of Brasilia, Brazil) and Francisco Rodriguez-Henriquez (CINVESTAV-IPN, Mexico)

5. Block Ciphers that are Easier to Mask: How Far Can we Go?
Benoît Gérard, Vincent Grosso, Maria Naya-Plasencia and François-Xavier Standaert (DGA and UCL Crypto Group and INRIA)

6. Inverting the final exponentiation of Tate pairings on ordinary elliptic curves using faults
Ronan Lashermes (CEA-Leti Minatec, Gardanne, France and UVSQ, Versailles, France) and Jacques Fournier (CEA-Leti Minatec, Gardanne, France) and Louis Goubin (UVSQ, Versailles, France)

7. Profiling DPA: Efficacy and efficiency trade-offs
Carolyn Whitnall and Elisabeth Oswald (University of Bristol, Department of Computer Science)

8. On Measurable Side-Channel Leaks inside ASIC Design Primitives
Takeshi Sugawara (Mitsubishi Electric Corporation), Daisuke Suzuki (Mitsubishi Electric Corporation), Minoru Saeki (Mitsubishi Electric Corporation), Mitsuru Shiozaki (Ritsumeikan University), Takeshi Fujino (Ritsumeikan University)

9. On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme
Amir Moradi and Oliver Mischke (Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany)

10. A Very High Speed True Random Number Generator with Entropy Assessment
Abdelkarim Cherkaoui (Laboratoire Hubert Curien, Saint-Etienne, France), Viktor Fischer (Laboratoire Hubert Curien, Saint-Etienne, France), Alain Aubert (Laboratoire Hubert Curien, Saint-Etienne, France) and Laurent Fesquet (Laboratoire TIMA, Grenoble, France)

11. Masking vs. Multiparty Computation: How Large is the Gap for AES?
Vincent Grosso, François-Xavier Standaert and Sebastian Faust (UCL Crypto Group and EPFL, Switzerland)

12. Pushing The Limits of SHA-3 Hardware Implementations to Fit on RFID
Peter Pessl and Michael Hutter (Institut for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria)

13. An Accurate Probabilistic Reliability Model for Silicon PUFs
Roel Maes (Intrinsic-ID)

14. Improving Modular Inversion in RNS using the Plus-Minus Method
Karim Bigou (INRIA Centre Rennes Bretagne Atlantique, IRISA, Université Rennes 1) and Arnaud Tisserand (CNRS, IRISA, Université Rennes 1)

15. McBits: fast constant-time code-based cryptography
Daniel J. Bernstein (University of Illinois at Chicago and Technische Universiteit Eindhoven), Tung Chou (Technische Universiteit Eindhoven) and Peter Schwabe (Radboud University Nijmegen)

16. Success through confidence: Evaluating the effectiveness of a side-channel attack
Adrian Thillard, Emmanuel Prouff and Thomas Roche (ANSSI, France)

17. A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
Mudit Bhargava and Ken Mai (Carnegie Mellon University)

18. Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
Stefan Heyse, Ingo von Maurich, Tim Güneysu (Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany)

19. High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
Joppe W. Bos (Microsoft Research), Craig Costello (Microsoft Research), Huseyin Hisil (Yasar University), and Kristin Lauter (Microsoft Research)

20. Sleuth: Automated Verification of Software Power Analysis Countermeasures
Ali Galip Bayrak (EPFL, Switzerland), Francesco Regazzoni (TU Delft, Netherlands and ALaRI - University of Lugano, Switzerland), David Novo (EPFL, Switzerland), Paolo Ienne (EPFL, Switzerland)

21. On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
Yossef Oren (Tel-Aviv University, Israel), Ahmad-Reza Sadeghi (TU Darmstadt/CASED, Germany) and Christian Wachsmann (Intel CRI-SC at TU Darmstadt, Germany)

22. FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
Begul Bilgin (KU Leuven, Belgium, iMinds, Belgium, University of Twente, The Netherlands), Andrey Bogdanov (Technical University of Denmark, Denmark), Miroslav Knezevic (NXP Semiconductors, Belgium), Florian Mendel (Graz University of Technology, Austria), Qingju Wang (KU Leuven, Belgium, iMinds, Belgium, Shanghai Jiao Tong University, China)

23. Leakage-Resilient Symmetric Encryption via Re-keying
Michel Abdalla, Sonia Belaïd and Pierre-Alain Fouque (Ecole Normale Supérieure, Thales Communications and Security, Rennes University)

24. Stealthy Dopant-Level Hardware Trojans
Georg T. Becker (University of Massachusetts Amherst, USA), Francesco Regazzoni (TU Delft, Netherlands and ALaRI - University of Lugano, Switzerland), Christof Paar (Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum, Germany and University of Massachusetts Amherst, USA) and Wayne P. Burleson (University of Massachusetts Amherst, USA)

25. A New Model for Error-Tolerant Side-Channel Cube Attacks
Zhenqi Li, Bin Zhang, Junfeng Fan and Ingrid Verbauwhede (Institute of Software, Chinese Academy of Sciences, State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering, Chinese Academy of Sciences, Katholieke Universiteit Leuven, ESAT SCD/COSIC)

26. On the Implementation of Unified Arithmetic on Binary Huff Curves
Santosh Ghosh (Security Center of Excellence, Intel Corporation, OR, US), Amit Kumar (Department of Electrical Engineering, IIT Kharagpur, WB, India), Amitabh Das (COSIC, KU Leuven, Belgium), Ingrid Varbauwhede (COSIC, KU Leuven, Belgium)

27. Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
Arnab Roy and Srinivas Vivek (Université du Luxembourg)