71 | -- | 72 | Lejla Batina, Matthew J. B. Robshaw. Introduction to the CHES 2014 special issue |
73 | -- | 83 | Jean-Sébastien Coron, Arnab Roy 0005, Srinivas Vivek. Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures |
85 | -- | 94 | Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino. Reversing stealthy dopant-level circuits |
95 | -- | 112 | Daniel Genkin, Itamar Pipman, Eran Tromer. Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version |
113 | -- | 122 | Jo Vliegen, Nele Mentens, Dirk Koch, Dries Schellekens, Ingrid Verbauwhede. Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs |
123 | -- | 139 | Liran Lerman, Gianluca Bontempi, Olivier Markowitch. A machine learning approach against a masked AES - Reaching the limit of side-channel attacks with a learning model |
141 | -- | 151 | Shay Gueron, Vlad Krasnov. Fast prime field elliptic-curve cryptography with 256-bit primes |