Abstract is missing.
- Detecting positive voltage attacks on CMOS circuitsKamil Gomina, Philippe Gendrier, Philippe Candelier, Jean-Baptiste Rigaud, Assia Tria. 1-6 [doi]
- High-order timing attacksJean-Luc Danger, Nicolas Debande, Sylvain Guilley, Youssef Souissi. 7-12 [doi]
- On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-boxStjepan Picek, Baris Ege, Lejla Batina, Domagoj Jakobovic, Lukasz Chmielewski, Marin Golub. 13-18 [doi]
- Countering type confusion and buffer overflow attacks on Java smart cards by data type sensitive obfuscationMichael Lackner, Reinhard Berlach, Reinhold Weiss, Christian Steger. 19-24 [doi]
- Towards attacks on restricted memory areas through co-processors in embedded multi-OS environments via malicious firmware injectionPierre Schnarz, Joachim Wietzke, Ingo Stengel. 25-30 [doi]
- Group-signature schemes on constrained devices: the gap between theory and practiceRaphael Spreitzer, Jörn-Marc Schmidt. 31-36 [doi]
- Memory-efficient on-card byte code verification for Java cardsReinhard Berlach, Michael Lackner, Christian Steger, Johannes Loinig, Ernst Haselsteiner. 37-40 [doi]
- Adaptive entity-identifier generation for IMD emergency accessRobert M. Seepers, Christos Strydis, Ioannis Sourdis, Chris I. De Zeeuw. 41-44 [doi]
- Remote cache-timing attacks against AESVishal Saraswat, Daniel Feldman, Denis Foo Kune, Satyajit Das. 45-48 [doi]