{"title":"Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption","authors":"R. Primas, P. Pessl, S. Mangard","doi":"10.1007/978-3-319-66787-4_25","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_25","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Banik, S. Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
{"title":"GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption","authors":"S. Banik, S. Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo","doi":"10.1007/978-3-319-66787-4_16","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_16","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"87 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133887216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nisha Jacob, Johann Heyszl, A. Zankl, C. Rolfes, G. Sigl
{"title":"How to Break Secure Boot on FPGA SoCs Through Malicious Hardware","authors":"Nisha Jacob, Johann Heyszl, A. Zankl, C. Rolfes, G. Sigl","doi":"10.1007/978-3-319-66787-4_21","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_21","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114657578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tiago B. S. Reis, Diego F. Aranha, J. C. López-Hernández
{"title":"PRESENT Runs Fast - Efficient and Secure Implementation in Software","authors":"Tiago B. S. Reis, Diego F. Aranha, J. C. López-Hernández","doi":"10.1007/978-3-319-66787-4_31","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_31","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Bernstein, Stefan Kölbl, S. Lucks, P. Massolino, Florian Mendel, K. Nawaz, Tobias Schneider, P. Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier
{"title":"Gimli : A Cross-Platform Permutation","authors":"D. Bernstein, Stefan Kölbl, S. Lucks, P. Massolino, Florian Mendel, K. Nawaz, Tobias Schneider, P. Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier","doi":"10.1007/978-3-319-66787-4_15","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_15","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, S. Vivek
{"title":"Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures","authors":"Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, S. Vivek","doi":"10.1007/978-3-319-66787-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_8","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116252309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Jean, A. Moradi, Thomas Peyrin, Pascal Sasdrich
{"title":"Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY","authors":"J. Jean, A. Moradi, Thomas Peyrin, Pascal Sasdrich","doi":"10.1007/978-3-319-66787-4_33","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_33","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"10 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114033285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhe Liu, P. Longa, Geovandro Pereira, Oscar Reparaz, Hwajeong Seo
{"title":"Four mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks","authors":"Zhe Liu, P. Longa, Geovandro Pereira, Oscar Reparaz, Hwajeong Seo","doi":"10.1007/978-3-319-66787-4_32","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_32","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125602505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis","authors":"Sarani Bhattacharya, Debdeep Mukhopadhyay","doi":"10.1007/978-3-662-53140-2_29","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_29","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122954763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}