Abstract is missing.
- On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme)Amir Moradi, Oliver Mischke. 1-20 [doi]
- Success through Confidence: Evaluating the Effectiveness of a Side-Channel AttackAdrian Thillard, Emmanuel Prouff, Thomas Roche. 21-36 [doi]
- Profiling DPA: Efficacy and Efficiency Trade-OffsCarolyn Whitnall, Elisabeth Oswald. 37-54 [doi]
- Non-invasive Spoofing Attacks for Anti-lock Braking SystemsYasser Shoukry, Paul Martin, Paulo Tabuada, Mani B. Srivastava. 55-72 [doi]
- An Accurate Probabilistic Reliability Model for Silicon PUFsRoel Maes. 73-89 [doi]
- A High Reliability PUF Using Hot Carrier Injection Based Response ReinforcementMudit Bhargava, Ken Mai. 90-106 [doi]
- On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFsYossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann. 107-125 [doi]
- Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFIDPeter Pessl, Michael Hutter. 126-141 [doi]
- Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained HardwareBegül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang. 142-158 [doi]
- On Measurable Side-Channel Leaks Inside ASIC Design PrimitivesTakeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino. 159-178 [doi]
- A Very High Speed True Random Number Generator with Entropy AssessmentAbdelkarim Cherkaoui, Viktor Fischer, Laurent Fesquet, Alain Aubert. 179-196 [doi]
- Stealthy Dopant-Level Hardware TrojansGeorg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson. 197-214 [doi]
- A Differential Fault Attack on MICKEY 2.0Subhadeep Banik, Subhamoy Maitra. 215-232 [doi]
- Improving Modular Inversion in RNS Using the Plus-Minus MethodKarim Bigou, Arnaud Tisserand. 233-249 [doi]
- McBits: Fast Constant-Time Code-Based CryptographyDaniel J. Bernstein, Tung Chou, Peter Schwabe. 250-272 [doi]
- Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded DevicesStefan Heyse, Ingo von Maurich, Tim Güneysu. 273-292 [doi]
- Sleuth: Automated Verification of Software Power Analysis CountermeasuresAli Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne. 293-310 [doi]
- Lambda Coordinates for Binary Elliptic CurvesThomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez. 311-330 [doi]
- High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS DecompositionJoppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin Lauter. 331-348 [doi]
- On the Implementation of Unified Arithmetic on Binary Huff CurvesSantosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede. 349-364 [doi]
- Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using FaultsRonan Lashermes, Jacques Fournier, Louis Goubin. 365-382 [doi]
- Block Ciphers That Are Easier to Mask: How Far Can We Go?Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert. 383-399 [doi]
- Masking vs. Multiparty Computation: How Large Is the Gap for AES?Vincent Grosso, François-Xavier Standaert, Sebastian Faust. 400-416 [doi]
- Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012Arnab Roy, Srinivas Vivek. 417-434 [doi]
- Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSAElke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson. 435-452 [doi]
- A New Model for Error-Tolerant Side-Channel Cube AttacksZhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede. 453-470 [doi]
- Leakage-Resilient Symmetric Encryption via Re-keyingMichel Abdalla, Sonia Belaïd, Pierre-Alain Fouque. 471-488 [doi]