This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.C., USA, during August 10-13, 2008.
The book contains 2 invited talks and 27 revised full papers which were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on side channel analysis, implementations, fault analysis, random number generation, and cryptography and cryptanalysis.
Author(s): Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain (auth.), Elisabeth Oswald, Pankaj Rohatgi (eds.)
Series: Lecture Notes in Computer Science 5154 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008
Language: English
Pages: 445
Tags: Data Encryption; Systems and Data Security; Coding and Information Theory; Algorithm Analysis and Problem Complexity; Special Purpose and Application-Based Systems; Computer Communication Networks
Front Matter....Pages -
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform....Pages 1-14
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs....Pages 15-29
Multiple-Differential Side-Channel Collision Attacks on AES....Pages 30-44
Time-Area Optimized Public-Key Engines: $\mathcal{MQ}$ -Cryptosystems as Replacement for Elliptic Curves?....Pages 45-61
Ultra High Performance ECC over NIST Primes on Commercial FPGAs....Pages 62-78
Exploiting the Power of GPUs for Asymmetric Cryptography....Pages 79-99
High-Performance Concurrent Error Detection Scheme for AES Hardware....Pages 100-112
A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis....Pages 113-129
RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks....Pages 130-145
A Design for a Physical RNG with Robust Entropy Estimators....Pages 146-163
Fast Digital TRNG Based on Metastable Ring Oscillator....Pages 164-180
Efficient Helper Data Key Extractor on FPGAs....Pages 181-197
The Carry Leakage on the Randomized Exponent Countermeasure....Pages 198-213
Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths....Pages 214-227
Attacking State-of-the-Art Software Countermeasures—A Case Study for AES....Pages 228-243
Binary Edwards Curves....Pages 244-265
A Real-World Attack Breaking A5/1 within Hours....Pages 266-282
Hash Functions and RFID Tags: Mind the Gap....Pages 283-299
A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases....Pages 300-314
A Very Compact Hardware Implementation of the MISTY1 Block Cipher....Pages 315-330
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography....Pages 331-345
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration....Pages 346-362
RFID and Its Vulnerability to Faults....Pages 363-379
Perturbating RSA Public Keys: An Improved Attack....Pages 380-395
Divided Backend Duplication Methodology for Balanced Dual Rail Routing....Pages 396-410
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages....Pages 411-425
Mutual Information Analysis....Pages 426-442
RSA—Past, Present, Future....Pages 443-443
A Vision for Platform Security....Pages 444-444
Back Matter....Pages -