Cryptographic Hardware and Embedded Systems - CHES 2010: 12th International Workshop, Santa Barbara, USA, August 17-20, 2010, Proceedings

by ;
Format: Paperback
Pub. Date: 2010-11-05
Publisher(s): Springer-Verlag New York Inc
Availability: This title is currently not available.
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $129.00

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

Summary

This book constitutes the refereed proceedings of the 12th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, held in Santa Barbara, USA during August 17-20, 2010.This year it was co-located with the 30th International Cryptology Conference (CRYPTO).The book contains 2 invited talks and 30 revised full papers which were carefully reviewed and selected from from 108 submissions. The papers are organized in topical sections on low cost cryptography, efficient implementation, side-channel attacks and countermeasures, tamper resistance, hardware trojans, PUFs and RNGs.

Table of Contents

Low Cost Cryptography
QUARK: A Lightweight Hashp. 1
PRINTcipher: A Block Cipher for IC-Printingp. 16
Sponge-Based Pseudo-Random Number Generatorsp. 33
Efficient Implementations I
A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over &$$$;p. 48
Co-Z Addition Formulæ and Binary Ladders on Elliptic Curvesp. 65
Efficient Techniques for High-Speed Elliptic Curve Cryptographyp. 80
Side-Channel Attacks and Countermeasures I
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009p. 95
New Results on Instruction Cache Attacksp. 110
Correlation-Enhanced Power Analysis Collision Attackp. 125
Side-Channel Analysis of Six SHA-3 Candidatesp. 140
Tamper Resistance and Hardware Trojans
Flash Memory 'Bumping' Attacksp. 158
Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detectionp. 173
When Failure Analysis Meets Side-Channel Attacksp. 188
Efficient Implementations II
Fast Exhaustive Search for Polynomial Systems in &$$$;p. 203
256 Bit Standardized Crypto for 650 GE - GOST Revisitedp. 219
Mixed Bases for Efficient Inversion in &$$$; and Conversion Matrices of SubBytes of AESp. 234
SHA-3
Developing a Hardware Evaluation Method for SHA-3 Candidatesp. 248
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAsp. 264
Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architecturesp. 279
XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Frameworkp. 294
Fault Attacks and Countermeasures
Public Key Perturbation of Randomized RSA Implementationsp. 306
Fault Sensitivity Analysisp. 320
PUFs and RNGs
An Alternative to Error Correction for SRAM-Like PUFsp. 335
New High Entropy Element for FPGA Based True Random Number Generatorsp. 351
The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapesp. 366
New Designs
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programsp. 383
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardwarep. 398
Side-Channel Attacks and Countermeasures II
Provably Secure Higher-Order Masking of AESp. 413
Algebraic Side-Channel Analysis in the Presence of Errorsp. 428
Coordinate Blinding over Large Prime Fieldsp. 443
Author Indexp. 457
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.