Gierlichs, Benedikt (ed.); Poschmann, Axel Y. (ed.) Cryptographic hardware and embedded systems – CHES 2016. 18th international conference, Santa Barbara, CA, USA, August 17–19, 2016. Proceedings. (English) Zbl 1343.68009 Lecture Notes in Computer Science 9813. Berlin: Springer (ISBN 978-3-662-53139-6/pbk; 978-3-662-53140-2/ebook). xiv, 650 p. (2016). Show indexed articles as search result. The articles of mathematical interest will be reviewed individually. For the preceding workshop see [Zbl 1343.68011].Indexed articles:Dugardin, Margaux; Guilley, Sylvain; Danger, Jean-Luc; Najm, Zakaria; Rioul, Olivier, Correlated extra-reductions defeat blinded regular exponentiation, 3-22 [Zbl 1380.94085]Battistello, Alberto; Coron, Jean-Sébastien; Prouff, Emmanuel; Zeitoun, Rina, Horizontal side-channel attacks and countermeasures on the ISW masking scheme, 23-39 [Zbl 1380.94071]Durvaux, François; Standaert, François-Xavier; Del Pozo, Santos Merino, Towards easy leakage certification, 40-60 [Zbl 1380.94086]Poussier, Romain; Standaert, François-Xavier; Grosso, Vincent, Simple key enumeration (and rank estimation) using histograms: an integrated approach, 61-81 [Zbl 1380.94117]Boss, Erik; Grosso, Vincent; Güneysu, Tim; Leander, Gregor; Moradi, Amir; Schneider, Tobias, Strong 8-bit sboxes with efficient masking in hardware, 171-193 [Zbl 1429.94053]De Cnudde, Thomas; Reparaz, Oscar; Bilgin, Begül; Nikova, Svetla; Nikov, Ventzislav; Rijmen, Vincent, Masking AES with \(d+1\) shares in hardware, 194-212 [Zbl 1429.94056]Bos, Joppe W.; Hubain, Charles; Michiels, Wil; Teuwen, Philippe, Differential computation analysis: hiding your white-box designs is not enough, 215-236 [Zbl 1429.94052]Groot Bruinderink, Leon; Hülsing, Andreas; Lange, Tanja; Yarom, Yuval, Flush, Gauss, and reload – a cache attack on the BLISS lattice-based signature scheme, 323-345 [Zbl 1411.94065]Ganji, Fatemeh; Tajik, Shahin; Fäßler, Fabian; Seifert, Jean-Pierre, Strong machine learning attack against PUFs with no mathematical model, 391-411 [Zbl 1380.94090]Delvaux, Jeroen; Gu, Dawu; Verbauwhede, Ingrid; Hiller, Matthias; Yu, Meng-Day (Mandel), Efficient fuzzy extraction of PUF-induced secrets: theory and applications, 412-431 [Zbl 1380.94082]Xiong, Wenjie; Schaller, André; Anagnostopoulos, Nikolaos A.; Saleem, Muhammad Umair; Gabmeyer, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub, Run-time accessible DRAM PUFs in commodity devices, 432-453 [Zbl 1380.94131]Goudarzi, Dahmun; Rivain, Matthieu, On the multiplicative complexity of Boolean functions and bitsliced higher-order masking, 457-478 [Zbl 1411.94063]Pulkus, Jürgen; Vivek, Srinivas, Reducing the number of non-linear multiplications in masking schemes, 479-497 [Zbl 1411.94084]Coron, Jean-Sébastien; Greuet, Aurélien; Prouff, Emmanuel; Zeitoun, Rina, Faster evaluation of sboxes via common shares, 498-514 [Zbl 1411.94055]Järvinen, Kimmo; Miele, Andrea; Azarderakhsh, Reza; Longa, Patrick, Four\(\mathbb {Q}\) on FPGA: new hardware speed records for elliptic curve cryptography over large prime characteristic fields, 517-537 [Zbl 1411.94068]Kammerstetter, Markus; Muellner, Markus; Burian, Daniel; Kudera, Christian; Kastner, Wolfgang, Efficient high-speed WPA2 brute force attacks using scalable low-cost FPGA clustering, 559-577 [Zbl 1411.94070]Saha, Dhiman; Chowdhury, Dipanwita Roy, EnCounter: on breaking the nonce barrier in differential fault analysis with a case-study on PAEQ, 581-601 [Zbl 1411.94086] Cited in 1 ReviewCited in 1 Document MSC: 68-06 Proceedings, conferences, collections, etc. pertaining to computer science 94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory 68P25 Data encryption (aspects in computer science) 94A60 Cryptography 00B25 Proceedings of conferences of miscellaneous specific interest PDF BibTeX XML Cite \textit{B. Gierlichs} (ed.) and \textit{A. Y. Poschmann} (ed.), Cryptographic hardware and embedded systems -- CHES 2016. 18th international conference, Santa Barbara, CA, USA, August 17--19, 2016. Proceedings. Berlin: Springer (2016; Zbl 1343.68009) Full Text: DOI