Abstract is missing.
- Quark: A Lightweight HashJean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia. 1-15 [doi]
- PRINTcipher: A Block Cipher for IC-PrintingLars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw. 16-32 [doi]
- Sponge-Based Pseudo-Random Number GeneratorsGuido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche. 33-47 [doi]
- p\mathbb{F}_pNicolas Guillermin. 48-64 [doi]
- Co-::::Z:::: Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract)Raveen R. Goundar, Marc Joye, Atsuko Miyaji. 65-79 [doi]
- Efficient Techniques for High-Speed Elliptic Curve CryptographyPatrick Longa, Catherine H. Gebotys. 80-94 [doi]
- Analysis and Improvement of the Random Delay Countermeasure of CHES 2009Jean-Sébastien Coron, Ilya Kizhvatov. 95-109 [doi]
- New Results on Instruction Cache AttacksOnur Aciiçmez, Billy Bob Brumley, Philipp Grabher. 110-124 [doi]
- Correlation-Enhanced Power Analysis Collision AttackAmir Moradi, Oliver Mischke, Thomas Eisenbarth. 125-139 [doi]
- Side-Channel Analysis of Six SHA-3 CandidatesOlivier Benoît, Thomas Peyrin. 140-157 [doi]
- Flash Memory 'Bumping' AttacksSergei Skorobogatov. 158-172 [doi]
- Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan DetectionDongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia. 173-187 [doi]
- When Failure Analysis Meets Side-Channel AttacksJerome Di-Battista, Jean-Christophe Courrège, Bruno Rouzeyre, Lionel Torres, Philippe Perdu. 188-202 [doi]
- Fast Exhaustive Search for Polynomial Systems in ::::F::::::2::Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang. 203-218 [doi]
- 256 Bit Standardized Crypto for 650 GE - GOST RevisitedAxel Poschmann, San Ling, Huaxiong Wang. 219-233 [doi]
- Mixed Bases for Efficient Inversion in /mathbb ::::F::::((2:::2:::):::2:::) and Conversion Matrices of SubBytes of AESYasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa. 234-247 [doi]
- Developing a Hardware Evaluation Method for SHA-3 CandidatesLuca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, Frank K. Gürkaynak. 248-263 [doi]
- Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAsKris Gaj, Ekawat Homsirikamol, Marcin Rogawski. 264-278 [doi]
- Performance Analysis of the SHA-3 Candidates on Exotic Multi-core ArchitecturesJoppe W. Bos, Deian Stefan. 279-293 [doi]
- XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking FrameworkChristian Wenzel-Benner, Jens Gräf. 294-305 [doi]
- Public Key Perturbation of Randomized RSA ImplementationsAlexandre Berzati, Cécile Canovas-Dumas, Louis Goubin. 306-319 [doi]
- Fault Sensitivity AnalysisYang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta. 320-334 [doi]
- An Alternative to Error Correction for SRAM-Like PUFsMaximilian Hofer, Christoph Boehm. 335-350 [doi]
- New High Entropy Element for FPGA Based True Random Number GeneratorsMichal Varchola, Milos Drutarovsky. 351-365 [doi]
- The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch ShapesDaisuke Suzuki, Koichi Shimizu. 366-382 [doi]
- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003. 383-397 [doi]
- ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to HardwareStéphane Badel, Nilay Dagtekin, Jorge Nakahara, Khaled Ouafi, Nicolas Reffé, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay. 398-412 [doi]
- Provably Secure Higher-Order Masking of AESMatthieu Rivain, Emmanuel Prouff. 413-427 [doi]
- Algebraic Side-Channel Analysis in the Presence of ErrorsYossef Oren, Mario Kirschbaum, Thomas Popp, Avishai Wool. 428-442 [doi]
- Coordinate Blinding over Large Prime FieldsMichael Tunstall, Marc Joye. 443-455 [doi]