Abstract is missing.
- Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound ProtectionMichael Lackner, Reinhard Berlach, Johannes Loinig, Reinhold Weiss, Christian Steger. 1-15 [doi]
- Dynamic Fault Injection Countermeasure - A New Conception of Java Card SecurityGuillaume Barbu, Philippe Andouard, Christophe Giraud. 16-30 [doi]
- Java Card Combined Attacks with Localization-Agnostic Fault InjectionJulien Lancia. 31-45 [doi]
- Improved (and Practical) Public-Key Authentication for UHF RFID TagsSébastien Canard, Loïc Ferreira, Matt Robshaw. 46-61 [doi]
- Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-CardsJan Hajny, Lukas Malina. 62-76 [doi]
- On the Use of Shamir's Secret Sharing against Side-Channel AnalysisJean-Sébastien Coron, Emmanuel Prouff, Thomas Roche. 77-90 [doi]
- Secure Multiple SBoxes Implementation with Arithmetically Masked InputLuk Bettale. 91-105 [doi]
- Low-Cost Countermeasure against RPAJean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache. 106-122 [doi]
- Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov ModelsFrançois Durvaux, Mathieu Renauld, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon. 123-140 [doi]
- On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive DevicesTolga Yalçin, Elif Bilge Kavun. 141-157 [doi]
- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny DevicesJosep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich. 158-172 [doi]
- Putting together What Fits together - GrÆStlMarkus Pelnar, Michael Muehlberghuber, Michael Hutter. 173-187 [doi]
- Memory Access Pattern Protection for Resource-Constrained DevicesYuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake. 188-202 [doi]
- Multipurpose Cryptographic Primitive ARMADILLO3Petr Susil, Serge Vaudenay. 203-218 [doi]
- Improving Side-Channel Analysis with Optimal Linear TransformsDavid Oswald, Christof Paar. 219-233 [doi]
- SCA with Magnitude Squared CoherenceSébastien Tiran, Philippe Maurine. 234-247 [doi]
- Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel AnalysisJohann Heyszl, Dominik Merli, Benedikt Heinz, Fabrizio De Santis, Georg Sigl. 248-262 [doi]
- Efficient Template Attacks Based on Probabilistic Multi-class Support Vector MachinesTimo Bartkewitz, Kerstin Lemke-Rust. 263-276 [doi]
- Defensive Leakage CamouflageEric Brier, Quentin Fortier, Roman Korkikian, K. W. Magld, David Naccache, Guilherme Ozari de Almeida, Adrien Pommellet, A. H. Ragab, Jean Vuillemin. 277-295 [doi]