171 | -- | 185 | Daniel Lemire, Owen Kaser. Faster 64-bit universal hashing using carry-less multiplications |
187 | -- | 199 | Raveen R. Goundar, Marc Joye. Inversion-free arithmetic on elliptic curves through isomorphisms |
201 | -- | 216 | Pablo Rauzy, Sylvain Guilley, Zakaria Najm. Formally proved security of assembly code against power analysis - A case study on balanced logic |
217 | -- | 227 | Bruno Robisson, Hélène Le Bouder. Physical functions: the common factor of side-channel and fault attacks? |
229 | -- | 238 | David Galindo, Johann Großschädl, Zhe Liu 0001, Praveen Kumar Vadnala, Srinivas Vivek. Implementation of a leakage-resilient ElGamal key encapsulation mechanism |
239 | -- | 247 | Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger. Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis |
249 | -- | 258 | Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert. PAC learning of arbiter PUFs |