F. Ganji, Shahin Tajik, F. Fäßler, Jean-Pierre Seifert
{"title":"Strong Machine Learning Attack Against PUFs with No Mathematical Model","authors":"F. Ganji, Shahin Tajik, F. Fäßler, Jean-Pierre Seifert","doi":"10.1007/978-3-662-53140-2_19","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_19","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116926517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heiko Lohrke, Shahin Tajik, C. Boit, Jean-Pierre Seifert
{"title":"No Place to Hide: Contactless Probing of Secret Data on FPGAs","authors":"Heiko Lohrke, Shahin Tajik, C. Boit, Jean-Pierre Seifert","doi":"10.1007/978-3-662-53140-2_8","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_8","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115337670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alberto Battistello, J. Coron, E. Prouff, R. Zeitoun
{"title":"Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme","authors":"Alberto Battistello, J. Coron, E. Prouff, R. Zeitoun","doi":"10.1007/978-3-662-53140-2_2","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_2","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128873960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Layer Group Key Agreement for Automotive Controller Area Networks","authors":"Shalabh Jain, J. Guajardo","doi":"10.1007/978-3-662-53140-2_5","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_5","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeroen Delvaux, Dawu Gu, I. Verbauwhede, Matthias Hiller, M. Yu
{"title":"Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications","authors":"Jeroen Delvaux, Dawu Gu, I. Verbauwhede, Matthias Hiller, M. Yu","doi":"10.1007/978-3-662-53140-2_20","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_20","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"32 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125738145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"- vatiCAN - Vetted, Authenticated CAN Bus","authors":"S. Nürnberger, C. Rossow","doi":"10.1007/978-3-662-53140-2_6","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_6","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"12 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123878345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomaz Oliveira, J. C. López-Hernández, F. Rodríguez-Henríquez
{"title":"Software Implementation of Koblitz Curves over Quadratic Fields","authors":"Thomaz Oliveira, J. C. López-Hernández, F. Rodríguez-Henríquez","doi":"10.1007/978-3-662-53140-2_13","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_13","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124560334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joost Renes, P. Schwabe, Benjamin A. Smith, L. Batina
{"title":"mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers","authors":"Joost Renes, P. Schwabe, Benjamin A. Smith, L. Batina","doi":"10.1007/978-3-662-53140-2_15","DOIUrl":"https://doi.org/10.1007/978-3-662-53140-2_15","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121137336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC","authors":"Karim Bigou, A. Tisserand","doi":"10.1007/978-3-662-48324-4_7","DOIUrl":"https://doi.org/10.1007/978-3-662-48324-4_7","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114358947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Avik Chakraborti, A. Chattopadhyay, Muhammad Hassan, M. Nandi
{"title":"TriviA: A Fast and Secure Authenticated Encryption Scheme","authors":"Avik Chakraborti, A. Chattopadhyay, Muhammad Hassan, M. Nandi","doi":"10.1007/978-3-662-48324-4_17","DOIUrl":"https://doi.org/10.1007/978-3-662-48324-4_17","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"2490 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131186434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}