×

zbMATH — the first resource for mathematics

Cryptographic hardware and embedded systems – CHES 2016. 18th international conference, Santa Barbara, CA, USA, August 17–19, 2016. Proceedings. (English) Zbl 1343.68009
Lecture Notes in Computer Science 9813. Berlin: Springer (ISBN 978-3-662-53139-6/pbk; 978-3-662-53140-2/ebook). xiv, 650 p. (2016).

Show indexed articles as search result.

The articles of mathematical interest will be reviewed individually. For the preceding workshop see [Zbl 1343.68011].
Indexed articles:
Dugardin, Margaux; Guilley, Sylvain; Danger, Jean-Luc; Najm, Zakaria; Rioul, Olivier, Correlated extra-reductions defeat blinded regular exponentiation, 3-22 [Zbl 1380.94085]
Battistello, Alberto; Coron, Jean-Sébastien; Prouff, Emmanuel; Zeitoun, Rina, Horizontal side-channel attacks and countermeasures on the ISW masking scheme, 23-39 [Zbl 1380.94071]
Durvaux, François; Standaert, François-Xavier; Del Pozo, Santos Merino, Towards easy leakage certification, 40-60 [Zbl 1380.94086]
Poussier, Romain; Standaert, François-Xavier; Grosso, Vincent, Simple key enumeration (and rank estimation) using histograms: an integrated approach, 61-81 [Zbl 1380.94117]
Boss, Erik; Grosso, Vincent; Güneysu, Tim; Leander, Gregor; Moradi, Amir; Schneider, Tobias, Strong 8-bit sboxes with efficient masking in hardware, 171-193 [Zbl 1429.94053]
De Cnudde, Thomas; Reparaz, Oscar; Bilgin, Begül; Nikova, Svetla; Nikov, Ventzislav; Rijmen, Vincent, Masking AES with \(d+1\) shares in hardware, 194-212 [Zbl 1429.94056]
Bos, Joppe W.; Hubain, Charles; Michiels, Wil; Teuwen, Philippe, Differential computation analysis: hiding your white-box designs is not enough, 215-236 [Zbl 1429.94052]
Groot Bruinderink, Leon; Hülsing, Andreas; Lange, Tanja; Yarom, Yuval, Flush, Gauss, and reload – a cache attack on the BLISS lattice-based signature scheme, 323-345 [Zbl 1411.94065]
Ganji, Fatemeh; Tajik, Shahin; Fäßler, Fabian; Seifert, Jean-Pierre, Strong machine learning attack against PUFs with no mathematical model, 391-411 [Zbl 1380.94090]
Delvaux, Jeroen; Gu, Dawu; Verbauwhede, Ingrid; Hiller, Matthias; Yu, Meng-Day (Mandel), Efficient fuzzy extraction of PUF-induced secrets: theory and applications, 412-431 [Zbl 1380.94082]
Xiong, Wenjie; Schaller, André; Anagnostopoulos, Nikolaos A.; Saleem, Muhammad Umair; Gabmeyer, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub, Run-time accessible DRAM PUFs in commodity devices, 432-453 [Zbl 1380.94131]
Goudarzi, Dahmun; Rivain, Matthieu, On the multiplicative complexity of Boolean functions and bitsliced higher-order masking, 457-478 [Zbl 1411.94063]
Pulkus, Jürgen; Vivek, Srinivas, Reducing the number of non-linear multiplications in masking schemes, 479-497 [Zbl 1411.94084]
Coron, Jean-Sébastien; Greuet, Aurélien; Prouff, Emmanuel; Zeitoun, Rina, Faster evaluation of sboxes via common shares, 498-514 [Zbl 1411.94055]
Järvinen, Kimmo; Miele, Andrea; Azarderakhsh, Reza; Longa, Patrick, Four\(\mathbb {Q}\) on FPGA: new hardware speed records for elliptic curve cryptography over large prime characteristic fields, 517-537 [Zbl 1411.94068]
Kammerstetter, Markus; Muellner, Markus; Burian, Daniel; Kudera, Christian; Kastner, Wolfgang, Efficient high-speed WPA2 brute force attacks using scalable low-cost FPGA clustering, 559-577 [Zbl 1411.94070]
Saha, Dhiman; Chowdhury, Dipanwita Roy, EnCounter: on breaking the nonce barrier in differential fault analysis with a case-study on PAEQ, 581-601 [Zbl 1411.94086]

MSC:
68-06 Proceedings, conferences, collections, etc. pertaining to computer science
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
68P25 Data encryption (aspects in computer science)
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
PDF BibTeX XML Cite
Full Text: DOI