Abstract is missing.
- Entropy-based Power AttackHoussem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament. 1-6 [doi]
- Low Voltage Fault Attacks to AESAlessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi. 7-12 [doi]
- Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection ApproachSeetharam Narasimhan, Rajat Subhra Chakraborty, Dongdong Du, Somnath Paul, Francis G. Wolff, Christos A. Papachristou, Kaushik Roy, Swarup Bhunia. 13-18 [doi]
- Using Multiple Processors in a Single Reconfigurable Fabric for High-assurance ApplicationsBruce Newgard, Colby Hoffman. 25-29 [doi]
- Side-channel based Watermarks for Integrated CircuitsGeorg T. Becker, Markus Kasper, Amir Moradi, Christof Paar. 30-35 [doi]
- Multiplexing Methods for Power WatermarkingDaniel Ziener, Florian Baueregger, Jürgen Teich. 36-41 [doi]
- Provably Secure Obfuscation of Diverse Watermarks for Sequential CircuitsFarinaz Koushanfar, Yousra Alkabani. 42-47 [doi]
- FPGA Implementations of the Hummingbird Cryptographic AlgorithmXinxin Fan, Guang Gong, Ken Lauffenburger, Troy Hicks. 48-51 [doi]
- ExCCel: Exploration of Complementary Cells for Efficient DPA Attack ResistivityKazuyuki Tanimura, Nikil Dutt. 52-55 [doi]
- Trusted RTL: Trojan Detection Methodology in Pre-silicon DesignsMainak Banga, Michael S. Hsiao. 56-59 [doi]
- Prototyping Platform for Performance Evaluation of SHA-3 CandidatesKazuyuki Kobayashi, Jun Ikegami, Kazuo Sakiyama, Kazuo Ohta, Miroslav Knezevic, Unal Kocabas, Junfeng Fan, Ingrid Verbauwhede, Eric Xu Guo, Shin ichiro Matsuo, Sinan Huang, Leyla Nazhandali, Akashi Satoh. 60-63 [doi]
- A Comparison of Power-analysis-resistant Digital CircuitsEric Menendez, Ken Mai. 64-69 [doi]
- SLICED: Slide-based Concurrent Error Detection Technique for Symmetric Block CiphersJeyavijayan Rajendran, Hetal Borad, Shyam Mantravadi, Ramesh Karri. 70-75 [doi]
- State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and CountermeasuresJunfeng Fan, Xu Guo, Elke De Mulder, Patrick Schaumont, Bart Preneel, Ingrid Verbauwhede. 76-87 [doi]
- Efficient One-pass Entity Authentication based on ECC for Constrained DevicesJohann Heyszl, Frederic Stumpf. 88-93 [doi]
- A Large Scale Characterization of RO-PUFAbhranil Maiti, Jeff Casarona, Luke McHale, Patrick Schaumont. 94-99 [doi]
- LISA: Maximizing RO PUF s Secret ExtractionChi-En Daniel Yin, Gang Qu. 100-105 [doi]
- Attack Resistant Sense Amplifier based PUFs (SA-PUF) with Deterministic and Controllable Reliability of PUF ResponsesMudit Bhargava, Cagla Cakir, Ken Mai. 106-111 [doi]
- Sensor Physical Unclonable FunctionsKurt Rosenfeld, Efstratios Gavas, Ramesh Karri. 112-117 [doi]
- Current Flattening Circuit for DPA CountermeasureEkarat Laohavaleeson, Chintan Patel. 118-123 [doi]
- Side-channel Attack Resistant ROM-based AES S-BoxCraig Teegarden, Mudit Bhargava, Ken Mai. 124-129 [doi]
- Hardware Implementations of Hash Function LuffaAkashi Satoh, Toshihiro Katashita, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki. 130-134 [doi]
- Entropy Extraction in Metastability-based TRNGVikram B. Suresh, Wayne P. Burleson. 135-140 [doi]