Abstract is missing.
- Template Attacks in Principal SubspacesCédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater. 1-14 [doi]
- Templates vs. Stochastic MethodsBenedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar. 15-29 [doi]
- Towards Security Limits in Side-Channel AttacksFrançois-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater. 30-45 [doi]
- HIGHT: A New Block Cipher Suitable for Low-Resource DeviceDeukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee. 46-59 [doi]
- Integer Factoring Utilizing PC ClusterKazumaro Aoki. 60 [doi]
- Optically Enhanced Position-Locked Power AnalysisSergei P. Skorobogatov. 61-75 [doi]
- Pinpointing the Side-Channel Leakage of Masked AES Hardware ImplementationsStefan Mangard, Kai Schramm. 76-90 [doi]
- A Generalized Method of Differential Fault Attack Against AES CryptosystemAmir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh. 91-100 [doi]
- Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code BreakerSandeep Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler. 101-118 [doi]
- Implementing the Elliptic Curve Method of Factoring in Reconfigurable HardwareKris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi. 119-133 [doi]
- Implementing Cryptographic Pairings on SmartcardsMichael Scott, Neil Costigan, Wesam Abdulwahab. 134-147 [doi]
- SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular FormToru Akishita, Masanobu Katagi, Izuru Kitamura. 148-159 [doi]
- Fast Generation of Prime Numbers on Portable Devices: An UpdateMarc Joye, Pascal Paillier. 160-173 [doi]
- A Proposition for Correlation Power Analysis EnhancementThanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume. 174-186 [doi]
- High-Resolution Side-Channel Attack Using Phase-Based Waveform MatchingNaofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh. 187-200 [doi]
- Cache-Collision Timing Attacks Against AESJoseph Bonneau, Ilya Mironov. 201-215 [doi]
- Provably Secure S-Box Implementation Based on Fourier TransformEmmanuel Prouff, Christophe Giraud, Sébastien Aumônier. 216-230 [doi]
- The Outer Limits of RFID SecurityAri Juels. 231 [doi]
- Three-Phase Dual-Rail Pre-charge LogicMarco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti. 232-241 [doi]
- Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel LeakageZhimin Chen, Yujie Zhou. 242-254 [doi]
- Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic StyleDaisuke Suzuki, Minoru Saeki. 255-269 [doi]
- Instruction Set Extensions for Efficient AES Implementation on 32-bit ProcessorsStefan Tillich, Johann Großschädl. 270-284 [doi]
- NanoCMOS-Molecular Realization of RijndaelMassoud Masoumi, Farshid Raissi, Mahmoud Ahmadian. 285-297 [doi]
- Improving SHA-2 Hardware ImplementationsRicardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis. 298-310 [doi]
- Offline Hardware/Software Authentication for Reconfigurable PlatformsEric Simpson, Patrick Schaumont. 311-323 [doi]
- Why One Should Also Secure RSA Public Key ElementsEric Brier, Benoît Chevallier-Mames, Mathieu Ciet, Christophe Clavier. 324-338 [doi]
- Power Attack on Small RSA Public ExponentPierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette. 339-353 [doi]
- Unified Point Addition Formulæ and Side-Channel AttacksDouglas Stebila, Nicolas Thériault. 354-368 [doi]
- Read-Proof Hardware from Protective CoatingsPim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters. 369-383 [doi]
- Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous CircuitsG. Fraidy Bouesse, Gilles Sicard, Marc Renaudin. 384-398 [doi]
- Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel AttacksKonrad J. Kulikowski, Alexander B. Smirnov, Alexander Taubin. 399-413 [doi]
- Challenges for Trusted ComputingAhmad-Reza Sadeghi. 414 [doi]
- Superscalar Coprocessor for High-Speed Curve-Based CryptographyKazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede. 415-429 [doi]
- Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 MicrocontrollerManuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Großschädl, Alexander Szekely, Stefan Tillich, Johannes Wolkerstorfer. 430-444 [doi]
- FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian IntegersV. S. Dimitrov, Kimmo U. Järvinen, M. J. Jacobson, W. F. Chan, Zhun Huang. 445-459 [doi]