This book constitutes the refereed proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2009, held in Lausanne, Switzerland during September 6-9, 2009.
The book contains 3 invited talks and 29 revised full papers which were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on software implementations, side channel analysis of secret key cryptosystems, side channel analysis of public key cryptosystems, side channel and fault analysis countermeasures, pairing-based cryptography, new ciphers and efficient implementations, TRNGs and device identification, hardware trojans and trusted ICs, theoretical aspects, and fault analysis.
Author(s): Emilia Käsper, Peter Schwabe (auth.), Christophe Clavier, Kris Gaj (eds.)
Series: Lecture Notes in Computer Science 5747 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009
Language: English
Pages: 472
Tags: Data Encryption; Coding and Information Theory; Data Structures, Cryptology and Information Theory; Systems and Data Security; Algorithm Analysis and Problem Complexity; Symbolic and Algebraic Manipulation
Front Matter....Pages -
Faster and Timing-Attack Resistant AES-GCM....Pages 1-17
Accelerating AES with Vector Permute Instructions....Pages 18-32
SSE Implementation of Multivariate PKCs on Modern x86 CPUs....Pages 33-48
MicroEliece: McEliece for Embedded Devices....Pages 49-64
Physical Unclonable Functions and Secure Processors....Pages 65-65
Practical Electromagnetic Template Attack on HMAC....Pages 66-80
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure....Pages 81-96
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA....Pages 97-111
Differential Cluster Analysis....Pages 112-127
Known–Plaintext–Only Attack on RSA–CRT with Montgomery Multiplication....Pages 128-140
A New Side-Channel Attack on RSA Prime Generation....Pages 141-155
An Efficient Method for Random Delay Generation in Embedded Software....Pages 156-170
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers....Pages 171-188
A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques....Pages 189-204
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions....Pages 205-219
Crypto Engineering: Some History and Some Case Studies....Pages 220-224
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers....Pages 225-239
Faster $\mathbb{F}_p$ -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves....Pages 240-253
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves....Pages 254-271
KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers....Pages 272-288
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security....Pages 289-303
Elliptic Curve Scalar Multiplication Combining Yao’s Algorithm and Double Bases....Pages 304-316
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators....Pages 317-331
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs....Pages 332-347
CDs Have Fingerprints Too....Pages 348-362
The State-of-the-Art in IC Reverse Engineering....Pages 363-381
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering....Pages 382-395
MERO : A Statistical Approach for Hardware Trojan Detection....Pages 396-410
On Tamper-Resistance from a Theoretical Viewpoint....Pages 411-428
Mutual Information Analysis: How, When and Why?....Pages 429-443
Fault Attacks on RSA Signatures with Partially Unknown Messages....Pages 444-456
Differential Fault Analysis on DES Middle Rounds....Pages 457-469
Back Matter....Pages -