Abstract is missing.
- The Pursuit of Happiness: Establishing Hardware Root-of-Trust for Cyber SecurityMark Mohammad Tehranipoor. 1 [doi]
- Formidable Challenges in Hardware Implementations of Fully Homomorphic Encryption Functions for Applications in Machine LearningÇetin Kaya Koç. 3 [doi]
- SoK: Towards Secret-Free SecurityUlrich Rührmair. 5-19 [doi]
- Erasable PUFs: Formal Treatment and Generic DesignChenglu Jin, Wayne P. Burleson, Marten van Dijk, Ulrich Rührmair. 21-33 [doi]
- Far Field EM Side-Channel Attack on AES Using Deep LearningRuize Wang, Huanyu Wang, Elena Dubrova. 35-44 [doi]
- Lightweight Implementation of the LowMC Block Cipher Protected Against Side-Channel AttacksJavad Bahrami, Viet B. Dang, Abubakr Abdulgadir, Khaled N. Khasawneh, Jens-Peter Kaps, Kris Gaj. 45-56 [doi]
- Exploring Effect of Residual Electric Charges on Cryptographic CircuitsMitsuru Shiozaki, Takeshi Sugawara, Takeshi Fujino. 57-66 [doi]
- Differential Fault Analysis of NORXAmit Jana, Dhiman Saha, Goutam Paul 0001. 67-79 [doi]
- PRINCE under Differential Fault Attack: Now in 3DAikata, Banashri Karmakar, Dhiman Saha. 81-91 [doi]
- Building a Modern TRNG: An Entropy Source Interface for RISC-VMarkku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall. 93-102 [doi]
- SoK: Physical and Logic Testing Techniques for Hardware Trojan DetectionSree Ranjani Rajendran, Rijoy Mukherjee, Rajat Subhra Chakraborty. 103-116 [doi]
- SpectreRewind: Leaking Secrets to Past InstructionsJacob Fustos, Michael Garrett Bechtel, Heechul Yun. 117-126 [doi]
- WaC: A New Doctrine for Hardware SecurityAdam Hastings, Simha Sethumadhavan. 127-136 [doi]