Abstract is missing.
- A Note on the Use of Margins to Compare DistinguishersOscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede. 1-8 [doi]
- A Theoretical Study of Kolmogorov-Smirnov Distinguishers - Side-Channel Analysis vs. Differential CryptanalysisAnnelie Heuser, Olivier Rioul, Sylvain Guilley. 9-28 [doi]
- Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AESValentina Banciu, Elisabeth Oswald. 29-40 [doi]
- Addition with Blinded OperandsMohamed Karroumi, Benjamin Richard, Marc Joye. 41-55 [doi]
- On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel ResistanceChristophe Giraud. 56-68 [doi]
- Common Points on Elliptic Curves: The Achilles' Heel of Fault Attack CountermeasuresAlberto Battistello. 69-81 [doi]
- On Adaptive Bandwidth Selection for Efficient MIAMathieu Carbone, Sébastien Tiran, Sébastien Ordas, Michel Agoyan, Yannick Teglia, Gilles R. Ducharme, Philippe Maurine. 82-97 [doi]
- Generic DPA Attacks: Curse or Blessing?Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede. 98-111 [doi]
- Support Vector Machines for Improved IP Detection with Soft Physical Hash FunctionsLudovic-Henri Gustin, François Durvaux, Stéphanie Kerckhof, François-Xavier Standaert, Michel Verleysen. 112-128 [doi]
- Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Gilles Piret. 129-143 [doi]
- Attacking Randomized Exponentiations Using Unsupervised LearningGuilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine. 144-160 [doi]
- On the Optimal Pre-processing for Non-profiling Differential Power AnalysisSuvadeep Hajra, Debdeep Mukhopadhyay. 161-178 [doi]
- Template Attacks on Different DevicesOmar Choudary, Markus G. Kuhn. 179-198 [doi]
- Using the Joint Distributions of a Cryptographic Function in Side Channel AnalysisYanis Linge, Cécile Dumas, Sophie Lambert-Lacroix. 199-213 [doi]
- A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a CountermeasureSho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki. 214-228 [doi]
- Adjusting Laser Injections for Fully Controlled FaultsFranck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria. 229-242 [doi]
- ChipWhisperer: An Open-Source Platform for Hardware Embedded Security ResearchColin O'Flynn, Zhizhang (David) Chen. 243-260 [doi]
- Verifying Software Integrity in Embedded Systems: A Side Channel ApproachMehari Msgna, Konstantinos Markantonakis, David Naccache, Keith Mayes. 261-280 [doi]
- Studying Leakages on an Embedded Biometric System Using Side Channel AnalysisMaël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, Taoufik Chouta, Jean-Luc Danger, Mélanie Favre, Tarik Graba. 281-298 [doi]
- On the Security of RSM - Presenting 5 First- and Second-Order AttacksSebastian Kutzner, Axel Poschmann. 299-312 [doi]