Abstract is missing.
- Side-Channel Attacks on SHA-1-Based Product Authentication ICsDavid Oswald. 3-14 [doi]
- Enhancing Dimensionality Reduction Methods for Side-Channel AttacksEleonora Cagli, Cécile Dumas, Emmanuel Prouff. 15-33 [doi]
- A Semi-Parametric Approach for Side-Channel Attacks on Protected RSA ImplementationsGuilherme Perin, Lukasz Chmielewski. 34-53 [doi]
- seTPM: Towards Flexible Trusted Computing on Mobile Devices Based on GlobalPlatform Secure ElementsSergej Proskurin, Michael Weiß, Georg Sigl. 57-74 [doi]
- Java Card Virtual Machine Compromising from a Bytecode Verified AppletJulien Lancia, Guillaume Bouffard. 75-88 [doi]
- Misuse of Frame Creation to Exploit Stack Underflow Attacks on Java CardBenoit Laugier, Tiana Razafindralambo. 89-104 [doi]
- From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model InferenceLouis Dureuil, Marie-Laure Potet, Philippe de Choudens, Cécile Dumas, Jessy Clédière. 107-124 [doi]
- Comparing Approaches to Rank Estimation for Side-Channel Security EvaluationsRomain Poussier, Vincent Grosso, François-Xavier Standaert. 125-142 [doi]
- Collision for Estimating SCA Measurement Quality and Related ApplicationsIbrahima Diop, Mathieu Carbone, Sébastien Ordas, Yanis Linge, Pierre-Yvan Liardet, Philippe Maurine. 143-157 [doi]
- Protecting the Control Flow of Embedded Processors against Fault AttacksMario Werner, Erich Wenger, Stefan Mangard. 161-176 [doi]
- Efficient Design and Evaluation of Countermeasures against Fault Attacks Using Formal VerificationLucien Goubet, Karine Heydemann, Emmanuelle Encrenaz, Ronald De Keulenaer. 177-192 [doi]
- Precise Laser Fault Injections into 90 nm and 45 nm SRAM-cellsBodo Selmke, Stefan Brummer, Johann Heyszl, Georg Sigl. 193-205 [doi]
- The Not-so-Distant Future: Distance-Bounding Protocols on SmartphonesSébastien Gambs, Carlos Eduardo Rosar Kós Lassance, Cristina Onete. 209-224 [doi]
- Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday SecurityChristoph Dobraunig, François Koeune, Stefan Mangard, Florian Mendel, François-Xavier Standaert. 225-241 [doi]
- On the Security of Balanced Encoding CountermeasuresYoo-Seung Won, Philip Hodgers, Máire O'Neill, Dong-Guk Han. 242-256 [doi]
- Higher-Order Threshold Implementation of the AES S-BoxThomas De Cnudde, Begül Bilgin, Oscar Reparaz, Ventzislav Nikov, Svetla Nikova. 259-272 [doi]
- Compact Implementations of Multi-Sbox DesignsBegül Bilgin, Miroslav Knezevic, Ventzislav Nikov, Svetla Nikova. 273-285 [doi]