Abstract is missing.
- 3D Hardware CanariesSébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf. 1-22 [doi]
- Breakthrough Silicon Scanning Discovers Backdoor in Military ChipSergei Skorobogatov, Christopher Woods. 23-40 [doi]
- Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of UsAlexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert. 41-57 [doi]
- Compiler Assisted MaskingAndrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall. 58-75 [doi]
- Threshold Implementations of All 3 ×3 and 4 ×4 S-BoxesBegül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz. 76-91 [doi]
- How Far Should Theory Be from Practice? - Evaluation of a CountermeasureAmir Moradi, Oliver Mischke. 92-106 [doi]
- Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean MaskingBlandine Debraize. 107-121 [doi]
- A Differential Fault Attack on the Grain Family of Stream CiphersSubhadeep Banik, Subhamoy Maitra, Santanu Sarkar. 122-139 [doi]
- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage ModelYossef Oren, Mathieu Renauld, François-Xavier Standaert, Avishai Wool. 140-154 [doi]
- Selecting Time Samples for Multivariate DPA AttacksOscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede. 155-174 [doi]
- Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled SettingBenoît Gérard, François-Xavier Standaert. 175-192 [doi]
- Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFsMarcel Medwed, François-Xavier Standaert, Antoine Joux. 193-212 [doi]
- Practical Leakage-Resilient Symmetric CryptographySebastian Faust, Krzysztof Pietrzak, Joachim Schipper. 213-232 [doi]
- A Statistical Model for DPA with Novel Algorithmic Confusion AnalysisYunsi Fei, Qiasi Luo, A. Adam Ding. 233-250 [doi]
- Practical Security Analysis of PUF-Based Two-Player ProtocolsUlrich Rührmair, Marten van Dijk. 251-267 [doi]
- Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single EnrollmentVincent van der Leest, Bart Preneel, Erik van der Sluis. 268-282 [doi]
- PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in SiliconStefan Katzenbeisser, Ünal Koçabas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann. 283-301 [doi]
- PUFKY: A Fully Functional PUF-Based Cryptographic Key GeneratorRoel Maes, Anthony Van Herrewege, Ingrid Verbauwhede. 302-319 [doi]
- NEON CryptoDaniel J. Bernstein, Peter Schwabe. 320-339 [doi]
- Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable HardwareStefan Heyse, Tim Güneysu. 340-355 [doi]
- Solving Quadratic Equations with XL on Parallel ArchitecturesChen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang. 356-373 [doi]
- Efficient Implementations of MQPKS on Constrained DevicesPeter Czypek, Stefan Heyse, Enrico Thomae. 374-389 [doi]
- Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy ViewpointStéphanie Kerckhof, François Durvaux, Cédric Hocquet, David Bol, François-Xavier Standaert. 390-407 [doi]
- Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice ImplementationSeiichi Matsuda, Shiho Moriai. 408-425 [doi]
- Low-Latency Encryption - Is "Lightweight = Light + Wait"?Miroslav Knezevic, Ventzislav Nikov, Peter Rombouts. 426-446 [doi]
- Attacking RSA-CRT Signatures with Faults on Montgomery MultiplicationPierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz. 447-462 [doi]
- Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPAMichael Vielhaber. 463-475 [doi]
- Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption ExponentsSantanu Sarkar, Subhamoy Maitra. 476-493 [doi]
- Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAsChester Rebeiro, Sujoy Sinha Roy, Debdeep Mukhopadhyay. 494-511 [doi]
- On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption SchemesNorman Göttert, Thomas Feller, Michael Schneider 0002, Johannes Buchmann, Sorin A. Huss. 512-529 [doi]
- Practical Lattice-Based Cryptography: A Signature Scheme for Embedded SystemsTim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann. 530-547 [doi]
- An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC ProcessorJen-Wei Lee, Szu-Chi Chung, Hsie-Chia Chang, Chen-Yi Lee. 548-564 [doi]