This book constitutes the refereed proceedings of the 12th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, held in Santa Barbara, USA during August 17-20, 2010. This year it was co-located with the 30th International Cryptology Conference (CRYPTO). The book contains 2 invited talks and 30 revised full papers which were carefully reviewed and selected from from 108 submissions. The papers are organized in topical sections on low cost cryptography, efficient implementation, side-channel attacks and countermeasures, tamper resistance, hardware trojans, PUFs and RNGs.
Author(s): Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia (auth.), Stefan Mangard, François-Xavier Standaert (eds.)
Series: Lecture Notes in Computer Science 6225 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010
Language: English
Pages: 458
Tags: Data Encryption; Coding and Information Theory; Data Structures, Cryptology and Information Theory; Systems and Data Security; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science
Front Matter....Pages -
Quark : A Lightweight Hash....Pages 1-15
PRINTcipher : A Block Cipher for IC-Printing....Pages 16-32
Sponge-Based Pseudo-Random Number Generators....Pages 33-47
A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over $\mathbb{F}_p$ ....Pages 48-64
Co- Z Addition Formulæ and Binary Ladders on Elliptic Curves....Pages 65-79
Efficient Techniques for High-Speed Elliptic Curve Cryptography....Pages 80-94
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009....Pages 95-109
New Results on Instruction Cache Attacks....Pages 110-124
Correlation-Enhanced Power Analysis Collision Attack....Pages 125-139
Side-Channel Analysis of Six SHA-3 Candidates....Pages 140-157
Flash Memory ‘Bumping’ Attacks....Pages 158-172
Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection....Pages 173-187
When Failure Analysis Meets Side-Channel Attacks....Pages 188-202
Fast Exhaustive Search for Polynomial Systems in ${\mathbb{F}_2}$ ....Pages 203-218
256 Bit Standardized Crypto for 650 GE – GOST Revisited....Pages 219-233
Mixed Bases for Efficient Inversion in ${{\mathbb F}{((2^2)^2)}{2}}$ and Conversion Matrices of SubBytes of AES....Pages 234-247
Developing a Hardware Evaluation Method for SHA-3 Candidates....Pages 248-263
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs....Pages 264-278
Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures....Pages 279-293
XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework....Pages 294-305
Public Key Perturbation of Randomized RSA Implementations....Pages 306-319
Fault Sensitivity Analysis....Pages 320-334
An Alternative to Error Correction for SRAM-Like PUFs....Pages 335-350
New High Entropy Element for FPGA Based True Random Number Generators....Pages 351-365
The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes....Pages 366-382
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs....Pages 383-397
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware....Pages 398-412
Provably Secure Higher-Order Masking of AES....Pages 413-427
Algebraic Side-Channel Analysis in the Presence of Errors....Pages 428-442
Coordinate Blinding over Large Prime Fields....Pages 443-455
Back Matter....Pages -