Abstract is missing.
- Faster and Timing-Attack Resistant AES-GCMEmilia Käsper, Peter Schwabe. 1-17 [doi]
- Accelerating AES with Vector Permute InstructionsMike Hamburg. 18-32 [doi]
- SSE Implementation of Multivariate PKCs on Modern x86 CPUsAnna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang. 33-48 [doi]
- MicroEliece: McEliece for Embedded DevicesThomas Eisenbarth, Tim Güneysu, Stefan Heyse, Christof Paar. 49-64 [doi]
- Physical Unclonable Functions and Secure ProcessorsSrini Devadas. 65 [doi]
- Practical Electromagnetic Template Attack on HMACPierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette. 66-80 [doi]
- First-Order Side-Channel Attacks on the Permutation Tables CountermeasureEmmanuel Prouff, Robert P. McEvoy. 81-96 [doi]
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPAMathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon. 97-111 [doi]
- Differential Cluster AnalysisLejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust. 112-127 [doi]
- Known-Plaintext-Only Attack on RSA-CRT with Montgomery MultiplicationMartin Hlavác. 128-140 [doi]
- A New Side-Channel Attack on RSA Prime GenerationThomas Finke, Max Gebhardt, Werner Schindler. 141-155 [doi]
- An Efficient Method for Random Delay Generation in Embedded SoftwareJean-Sébastien Coron, Ilya Kizhvatov. 156-170 [doi]
- Higher-Order Masking and Shuffling for Software Implementations of Block CiphersMatthieu Rivain, Emmanuel Prouff, Julien Doget. 171-188 [doi]
- A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL TechniquesMinoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh. 189-204 [doi]
- A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set ExtensionsFrancesco Regazzoni, Alessandro Cevrero, François-Xavier Standaert, Stéphane Badel, Theo Kluter, Philip Brisk, Yusuf Leblebici, Paolo Ienne. 205-219 [doi]
- Crypto Engineering: Some History and Some Case StudiesChristof Paar. 220-224 [doi]
- Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman MultipliersJean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco RodrÃguez-HenrÃquez. 225-239 [doi]
- Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig CurvesJunfeng Fan, Frederik Vercauteren, Ingrid Verbauwhede. 240-253 [doi]
- Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig CurvesDavid Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwächter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rudolf Mathar. 254-271 [doi]
- KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block CiphersChristophe De Cannière, Orr Dunkelman, Miroslav Knezevic. 272-288 [doi]
- Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and SecurityXu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede. 289-303 [doi]
- Elliptic Curve Scalar Multiplication Combining Yao s Algorithm and Double BasesNicolas Meloni, M. Anwar Hasan. 304-316 [doi]
- The Frequency Injection Attack on Ring-Oscillator-Based True Random Number GeneratorsA. Theodore Markettos, Simon W. Moore. 317-331 [doi]
- Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFsRoel Maes, Pim Tuyls, Ingrid Verbauwhede. 332-347 [doi]
- CDs Have Fingerprints TooGhaith Hammouri, Aykutlu Dana, Berk Sunar. 348-362 [doi]
- The State-of-the-Art in IC Reverse EngineeringRandy Torrance, Dick James. 363-381 [doi]
- Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel EngineeringLang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne Burleson. 382-395 [doi]
- MERO: A Statistical Approach for Hardware Trojan DetectionRajat Subhra Chakraborty, Francis G. Wolff, Somnath Paul, Christos A. Papachristou, Swarup Bhunia. 396-410 [doi]
- On Tamper-Resistance from a Theoretical ViewpointPaulo Mateus, Serge Vaudenay. 411-428 [doi]
- Mutual Information Analysis: How, When and Why?Nicolas Veyrat-Charvillon, François-Xavier Standaert. 429-443 [doi]
- Fault Attacks on RSA Signatures with Partially Unknown MessagesJean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier. 444-456 [doi]
- Differential Fault Analysis on DES Middle RoundsMatthieu Rivain. 457-469 [doi]