Abstract is missing.
- Evaluation of the Ability to Transform SIM Applications into Hostile ApplicationsGuillaume Bouffard, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary. 1-17 [doi]
- Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -Guillaume Barbu, Hugues Thiebeauld. 18-33 [doi]
- A Formal Security Model of a Smart Card Web ServerPierre Néron, Quang Huy Nguyen. 34-49 [doi]
- Differential Fault Analysis of AES-128 Key Schedule Using a Single Multi-byte FaultSubidh Ali, Debdeep Mukhopadhyay. 50-64 [doi]
- Combined Fault and Side-Channel Attack on Protected Implementations of AESThomas Roche, Victor Lomné, Karim Khalfallah. 65-83 [doi]
- Memory-Efficient Fault CountermeasuresMarc Joye, Mohamed Karroumi. 84-101 [doi]
- Redundant Modular Reduction AlgorithmsVincent Dupaquis, Alexandre Venelli. 102-114 [doi]
- Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault AttacksMarcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld, François-Xavier Standaert. 115-132 [doi]
- Fast Key Recovery Attack on ARMADILLO1 and VariantsPouyan Sepehrdad, Petr Susil, Serge Vaudenay. 133-150 [doi]
- Implementation and Evaluation of an SCA-Resistant Embedded ProcessorStefan Tillich, Mario Kirschbaum, Alexander Szekely. 151-165 [doi]
- Evaluating 16-Bit Processors for Elliptic Curve CryptographyErich Wenger, Mario Werner. 166-181 [doi]
- A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEsErich Wenger, Michael Hutter. 182-198 [doi]
- Memory Encryption for Smart CardsBaris Ege, Elif Bilge Kavun, Tolga Yalçin. 199-216 [doi]
- Compact FPGA Implementations of the Five SHA-3 FinalistsStéphanie Kerckhof, François Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Meurice de Dormale, François-Xavier Standaert. 217-233 [doi]
- An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information AnalysisCarolyn Whitnall, Elisabeth Oswald, Luke Mather. 234-251 [doi]
- A High-Performance Implementation of Differential Power Analysis on Graphics CardsTimo Bartkewitz, Kerstin Lemke-Rust. 252-265 [doi]
- RAM: Rapid Alignment MethodRuben A. Muijrers, Jasper G. J. van Woudenberg, Lejla Batina. 266-282 [doi]
- Combined Software and Hardware Attacks on the Java Card Control FlowGuillaume Bouffard, Julien Iguchi-Cartigny, Jean-Louis Lanet. 283-296 [doi]
- Java Card Operand Stack: Fault Attacks, Combined Attacks and CountermeasuresGuillaume Barbu, Guillaume Duc, Philippe Hoogvorst. 297-313 [doi]
- Formal Analysis of CWA 14890-1Ashar Javed. 314-335 [doi]