207 | -- | 219 | Jean DaRolt, Amitabh Das, Santosh Ghosh, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Ingrid Verbauwhede. Scan attacks on side-channel and fault attack resistant public-key implementations |
221 | -- | 240 | Brian Baldwin, Raveen R. Goundar, Mark Hamilton, William P. Marnane. Co-Z ECC scalar multiplications for hardware, software and hardware-software co-design on embedded systems |
241 | -- | 253 | Shay Gueron, Vlad Krasnov. Parallelizing message schedules to accelerate the computations of hash functions |
255 | -- | 269 | Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik, Wei Wu. A practical device authentication scheme using SRAM PUFs |