IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of CHES 2006

Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , Springer
Template Attacks in Principal Subspaces., Cédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater, pp. 1-14
 PDF  postscript BibTeX
Templates vs. Stochastic Methods., Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar, pp. 15-29
 PDF  postscript BibTeX
Towards Security Limits in Side-Channel Attacks., François-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater, pp. 30-45
 PDF  postscript BibTeX
HIGHT: A New Block Cipher Suitable for Low-Resource Device., Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee, pp. 46-59
 PDF  postscript BibTeX
Integer Factoring Utilizing PC Cluster., Kazumaro Aoki, pp. 60
 PDF  postscript BibTeX
Optically Enhanced Position-Locked Power Analysis., Sergei P. Skorobogatov, pp. 61-75
 PDF  postscript BibTeX
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations., Stefan Mangard, Kai Schramm, pp. 76-90
 PDF  postscript BibTeX
A Generalized Method of Differential Fault Attack Against AES Cryptosystem., Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, pp. 91-100
 PDF  postscript BibTeX
Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker., Sandeep Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler, pp. 101-118
 PDF  postscript BibTeX
Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware., Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi, pp. 119-133
 PDF  postscript BibTeX
Implementing Cryptographic Pairings on Smartcards., Michael Scott, Neil Costigan, Wesam Abdulwahab, pp. 134-147
 PDF  postscript BibTeX
SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form., Toru Akishita, Masanobu Katagi, Izuru Kitamura, pp. 148-159
 PDF  postscript BibTeX
Fast Generation of Prime Numbers on Portable Devices: An Update., Marc Joye, Pascal Paillier, pp. 160-173
 PDF  postscript BibTeX
A Proposition for Correlation Power Analysis Enhancement., Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume, pp. 174-186
 PDF  postscript BibTeX
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching., Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh, pp. 187-200
 PDF  postscript BibTeX
Cache-Collision Timing Attacks Against AES., Joseph Bonneau, Ilya Mironov, pp. 201-215
 PDF  postscript BibTeX
Provably Secure S-Box Implementation Based on Fourier Transform., Emmanuel Prouff, Christophe Giraud, Sébastien Aumônier, pp. 216-230
 PDF  postscript BibTeX
The Outer Limits of RFID Security., Ari Juels, pp. 231
 PDF  postscript BibTeX
Three-Phase Dual-Rail Pre-charge Logic., Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti, pp. 232-241
 PDF  postscript BibTeX
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage., Zhimin Chen, Yujie Zhou, pp. 242-254
 PDF  postscript BibTeX
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style., Daisuke Suzuki, Minoru Saeki, pp. 255-269
 PDF  postscript BibTeX
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors., Stefan Tillich, Johann Großschädl, pp. 270-284
 PDF  postscript BibTeX
NanoCMOS-Molecular Realization of Rijndael., Massoud Masoumi, Farshid Raissi, Mahmoud Ahmadian, pp. 285-297
 PDF  postscript BibTeX
Improving SHA-2 Hardware Implementations., Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis, pp. 298-310
 PDF  postscript BibTeX
Offline Hardware/Software Authentication for Reconfigurable Platforms., Eric Simpson, Patrick Schaumont, pp. 311-323
 PDF  postscript BibTeX
Why One Should Also Secure RSA Public Key Elements., Eric Brier, Benoît Chevallier-Mames, Mathieu Ciet, Christophe Clavier, pp. 324-338
 PDF  postscript BibTeX
Power Attack on Small RSA Public Exponent., Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette, pp. 339-353
 PDF  postscript BibTeX
Unified Point Addition Formulæ and Side-Channel Attacks., Douglas Stebila, Nicolas Thériault, pp. 354-368
 PDF  postscript BibTeX
Read-Proof Hardware from Protective Coatings., Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters, pp. 369-383
 PDF  postscript BibTeX
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits., G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin, pp. 384-398
 PDF  postscript BibTeX
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks., Konrad J. Kulikowski, Alexander Smirnov, Alexander Taubin, pp. 399-413
 PDF  postscript BibTeX
Challenges for Trusted Computing., Ahmad-Reza Sadeghi, pp. 414
 PDF  postscript BibTeX
Superscalar Coprocessor for High-Speed Curve-Based Cryptography., Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede, pp. 415-429
 PDF  postscript BibTeX
Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller., Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Großschädl, Alexander Szekely, Stefan Tillich, Johannes Wolkerstorfer, pp. 430-444
 PDF  postscript BibTeX
FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers., V. S. Dimitrov, Kimmo U. Järvinen, M. J. Jacobson, W. F. Chan, Z. Huang, pp. 445-459
 PDF  postscript BibTeX

[ IACR home page ] © IACR