Abstract is missing.
- Masking and MPC: When Crypto Theory Meets Crypto PracticeNigel P. Smart. 1 [doi]
- Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection OrderHannes Groß, Stefan Mangard, Thomas Korak. 3 [doi]
- Moments-Correlating DPAAmir Moradi 0001, François-Xavier Standaert. 5-15 [doi]
- Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes: A More Efficient, Shuffled, and Higher-Order Masked AES S-boxFabrizio De Santis, Tobias Bauer, Georg Sigl. 17-26 [doi]
- Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 ProcessorJacek Samotyja, Kerstin Lemke-Rust. 27-35 [doi]
- Threshold Implementations in Industry: A Case Study on SHA-256Michael Hutter. 37 [doi]
- ParTI: Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection AttacksTobias Schneider 0002, Amir Moradi 0001, Tim Güneysu. 39 [doi]
- On Non-uniformity in Threshold SharingsJoan Daemen. 41 [doi]
- Masking AES With d+1 Shares in HardwareThomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen. 43 [doi]