Abstract is missing.
- Evaluation of ASIC Implementation of Physical Random Number Generators Using RS LatchesHirotaka Kokubo, Dai Yamamoto, Masahiko Takenaka, Kouichi Itoh, Naoya Torii. 3-15 [doi]
- From New Technologies to New Solutions - Exploiting FRAM Memories to Enhance Physical SecurityStéphanie Kerckhof, François-Xavier Standaert, Eric Peeters. 16-29 [doi]
- Low Entropy Masking Schemes, RevisitedVincent Grosso, François-Xavier Standaert, Emmanuel Prouff. 33-43 [doi]
- On the Vulnerability of Low Entropy Masking SchemesXin Ye, Thomas Eisenbarth. 44-60 [doi]
- A Machine Learning Approach Against a Masked AESLiran Lerman, Stephane Fernandes Medeiros, Gianluca Bontempi, Olivier Markowitch. 61-75 [doi]
- Clustering Algorithms for Non-profiled Single-Execution Attacks on ExponentiationsJohann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl. 79-93 [doi]
- Optimization of Power Analysis Using Neural NetworkZdenek Martinasek, Jan Hajny, Lukas Malina. 94-107 [doi]
- Time-Frequency Analysis for Second-Order AttacksPierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul. 108-122 [doi]
- Vulnerability Analysis of a Commercial .NET Smart CardBehrang Fouladi, Konstantinos Markantonakis, Keith Mayes. 125-139 [doi]
- Manipulating the Frame Information with an Underflow AttackEmilie Faugeron. 140-151 [doi]
- Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon ProtocolAbdullah Ali Alshehri, Steve Schneider. 152-167 [doi]
- Revisiting Atomic Patterns for Scalar Multiplications on Elliptic CurvesFranck Rondepierre. 171-186 [doi]
- Efficient and First-Order DPA Resistant Implementations of KeccakBegül Bilgin, Joan Daemen, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen, Gilles Van Assche. 187-199 [doi]
- Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic AttacksGuilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine. 200-215 [doi]
- The Temperature Side Channel and Heating Fault AttacksMichael Hutter, Jörn-Marc Schmidt. 219-235 [doi]
- Glitch It If You Can: Parameter Search Strategies for Successful Fault InjectionRafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic, Marin Golub. 236-252 [doi]
- Efficient Template AttacksOmar Choudary, Markus G. Kuhn. 253-270 [doi]