Conference on Cryptographic Hardware and Embedded Systems 2017

Taipei, Taiwan, September 25–28, 2017

Accepted Papers

  • Nanofocused X-Ray Beam to Reprogram Secure Circuits
    Stéphanie Anceau (CEA, LETI, MINATEC Campus), Pierre Bleuet (CEA, LETI, MINATEC Campus), Jessy Clédière (CEA, LETI, MINATEC Campus), Laurent Maingault (CEA, LETI, MINATEC Campus), Jean-luc Rainard (CEA, LETI, MINATEC Campus), Rémi Tucoulou (The European Synchrotron for Rémi Tucoulou)
  • Reconciling d+1 Masking in Hardware and Software
    Hannes Gross (Graz University of Technology), Stefan Mangard (Graz University of Technology)
  • High-Order Conversion from Boolean to Arithmetic Masking
    Jean-Sebastien Coron (University of Luxembourg)
  • Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing
    Joan Daemen (Radboud University / STMicroelectronics)
  • On the Security of Carrier Phase-based Ranging
    Hildur Ólafsdóttir (ETH Zurich), Aanjhan Ranganathan (ETH Zurich), Srdjan Capkun (ETH Zurich)
  • Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
    Luka Malisa (ETH Zurich), Kari Kostiainen (ETH Zurich), Thomas Knell (ETH Zurich), David Sommer (ETH Zurich), Srdjan Capkun (ETH Zurich)
  • Your Rails Cannot Hide from Localized EM: How Dual-Rail Logic Fails on FPGAs
    Vincent Immler (Fraunhofer Institute for Applied and Integrated Security), Robert Specht (Fraunhofer Institute for Applied and Integrated Security), Florian Unterstein (Fraunhofer Institute for Applied and Integrated Security)
  • How to Break Secure Boot on FPGA SoCs through Malicious Hardware
    Nisha Jacob (Fraunhofer Institute for Applied and Integrated Security), Johann Heyszl (Fraunhofer Institute for Applied and Integrated Security), Carsten Rolfes (Fraunhofer Institute for Applied and Integrated Security), Andreas Zankl (Fraunhofer Institute for Applied and Integrated Security), Georg Sigl (Fraunhofer Institute for Applied and Integrated Security / Technische Universität München)
  • Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
    Hocheol Shin (Korea Advanced Institute of Science and Technology), Dohyun Kim (Korea Advanced Institute of Science and Technology), Yujin Kwon (Korea Advanced Institute of Science and Technology), Yongdae Kim (Korea Advanced Institute of Science and Technology)
  • A Side-Channel Assisted Cryptanalytic Attack against Qc-Bits
    Mélissa Rossi (Rambus Cryptography Research / École Normale Supéieure), Mike Hamburg (Rambus Cryptography Research), Michael Hutter (Rambus Cryptography Research), Mark E. Marson (Rambus Cryptography Research)
  • FourQ on Embedded Devices with Strong Countermeasures against Side-Channel Attacks
    Zhe Liu (University of Luxembourg / University of Waterloo), Patrick Longa (Microsoft Research), Geovandro Pereira (University of Waterloo), Oscar Reparaz (imec-COSIC KU Leuven), Hwajeong Seo (Hansung University).
  • McBits Revisited
    Tung Chou (Osaka University)
  • Very High Order Masking: Efficient Implementation and Security Evaluation
    Anthony Journault (ICTEAM/ELEN/Crypto Group, Université catholique de Louvain), François-Xavier Standaert (ICTEAM/ELEN/Crypto Group, Université catholique de Louvain)
  • Hiding Secrecy Leakage in Leaky Helper Data
    Matthias Hiller (Fraunhofer AISEC), Aysun Gurur Önalan (Technical University of Munich)
  • Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools
    Marios O. Choudary (University Politehnica of Bucharest), P.G. Popescu (University Politehnica of Bucharest)
  • Single-Trace Side-Channel Attacks on Masked Lattice-based Encryption
    Robert Primas (Graz University of Technology), Peter Pessl (Graz University of Technology), Stefan Mangard (Graz University of Technology)
  • Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives – Applications to AES, PRESENT and SKINNY
    Jérémy Jean (ANSSI), Amir Moradi (Ruhr-Universität Bochum), Thomas Peyrin (Nanyang Technological University), Pascal Sasdrich (Ruhr-Universität Bochum)
  • Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages
    Christophe Clavier (University of Limoges), Léo Reynaud (University of Limoges)
  • A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
    Romain Poussier (Université catholique de Louvain), Yuanyuan Zhou (Université catholique de Louvain / Brightsight BV), François-Xavier Standaert (Université catholique de Louvain)
  • Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices
    Björn Haase (Endress + Hauser Conducta GmbH & Co. KG), Benoît Labrique (Endress + Hauser Conducta GmbH & Co. KG)
  • Faster Homomorphic Function Evaluation Using Non-Integral Base Encoding
    Charlotte Bonte (KU Leuven), Carl Bootland ( KU Leuven), Joppe W. Bos (NXP Semiconductors), Wouter Castryck (KU Leuven / Université de Lille-1), Ilia Iliashenko (KU Leuven), Frederik Vercauteren (KU Leuven / Open Security Research)
  • PRESENT Runs Fast: Efficient and Secure Implementation in Software
    Tiago Bruno Silva dos Reis (University of Campinas), Diego F. Aranha (University of Campinas), Julio López (University of Campinas)
  • Fast Leakage Assessment
    Oscar Reparaz (imec-COSIC KU Leuven), Benedikt Gierlichs (imec-COSIC KU Leuven), Ingrid Verbauwhede (imec-COSIC KU Leuven)
  • Convolutional Neural Networks with Data Augmentation against Jitter-based Countermeasures – Profiling Attacks without Pre-Processing
    Eleonora Cagli (Univ. Grenoble Alpes / CEA, LETI, MINATEC Campus / Sorbonne Universités, UPMC Univ Paris 06), Cécile Dumas (Univ. Grenoble Alpes / CEA, LETI, MINATEC Campus), Emmanuel Prouff (Safran Identity and Security / Sorbonne Universités, UPMC Univ Paris 06)
  • Sliding Right into Disaster: Left-to-Right Sliding Windows Leak
    Daniel J. Bernstein (University of Illinois at Chicago), Joachim Breitner (University of Pennsylvania), Daniel Genkin (University of Pennsylvania / University of Maryland), Leon Groot Bruinderink (Technische Universiteit Eindhoven), Nadia Heninger (University of Pennsylvania), Tanja Lange (Technische Universiteit Eindhoven), Christine van Vredendaal (Technische Universiteit Eindhoven), Yuval Yarom (University of Adelaide / Data61, CSIRO)
  • Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
    Dahmun Goudarzi (CryptoExperts/ENS), Matthieu Rivain (CryptoExperts), Damien Vergnaud (ENS), Srinivas Vivek (University of Bristol)
  • CacheZoom: How SGX Amplifies the Power of Cache Attacks
    Ahmad Moghimi (Worcester Polytechnic Institute), Gorka Irazoqui (Worcester Polytechnic Institute), Thomas Eisenbarth (Worcester Polytechnic Institute)
  • Gimli: A Cross-Platform Permutation
    Daniel J. Bernstein (University of Illinois at Chicago), Stefan Koelbl (Technical University of Denmark), Stefan Lucks (Bauhaus-Universität Weimar), Pedro Maat Costa Massolino (Radboud University), Florian Mendel (Graz University of Technology, IAIK), Kashif Nawaz (Université Catholique de Louvain), Tobias Schneider (Ruhr-University Bochum), Peter Schwabe (Radboud University), François-Xavier Standaert (Université Catholique de Louvain), Yosuke Todo (NTT Secure Platform Laboratories), Benoît Viguier (Radboud University)
  • Novel Bypass Attack and BDD-based Tradeoff Analysis against All Known Logic Locking Attacks
    Xiaolin Xu (FICS Research, University of Florida), Bicky Shakya (FICS Research, University of Florida), Mark Tehranipoor (FICS Research, University of Florida), Domenic J. Forte (FICS Research, University of Florida)
  • FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes
    Wen Wang (Yale University), Jakub Szefer (Yale University), Ruben Niederhagen (Fraunhofer Institute for Secure Information Technology)
  • High-Speed Key Encapsulation from NTRU
    Andreas Hülsing (Department of Mathematics and Computer Science,Technische Universiteit Eindhoven), Joost Rijneveld (Digital Security Group, Radboud University), John Schanck (Institute for Quantum Computing, University of Waterloo / Security Innovation), Peter Schwabe (Digital Security Group, Radboud University)
  • GIFT: A Small Present
    Subhadeep Banik (Nanyang Technological University), Sumit Kumar Pandey (Nanyang Technological University), Thomas Peyrin (Nanyang Technological University), Siang Meng Sim (Nanyang Technological University), Yosuke Todo (NTT Secure Platform Laboratories), Yu Sasaki (NTT Secure Platform Laboratories)
  • Blockcipher-based Authenticated Encryption: How Small Can We Go?
    Avik Chakraborti (NTT Secure Platform Laboratories), Tetsu Iwata (Nagoya University), Kazuhiko Minematsu (NEC Corporation), Mridul Nandi (Applied Statistics Unit, Indian Statistical Institute)