Abstract is missing.
- EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack SensorNaofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki. 1-16 [doi]
- A New Framework for Constraint-Based Probabilistic Template Side Channel AttacksYossef Oren, Ofir Weisse, Avishai Wool. 17-34 [doi]
- How to Estimate the Success Rate of Higher-Order Side-Channel AttacksVictor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard. 35-54 [doi]
- Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication TheoryAnnelie Heuser, Olivier Rioul, Sylvain Guilley. 55-74 [doi]
- "Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long WayNaomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom. 75-92 [doi]
- Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault AttacksHarshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay. 93-111 [doi]
- Reversing Stealthy Dopant-Level CircuitsTakeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino. 112-126 [doi]
- Constructing S-boxes for Lightweight Cryptography with Feistel StructureYongqiang Li, Mingsheng Wang. 127-146 [doi]
- A Statistical Model for Higher Order DPA on Masked DevicesA. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo. 147-169 [doi]
- Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel CountermeasuresJean-Sébastien Coron, Arnab Roy 0005, Srinivas Vivek. 170-187 [doi]
- Secure Conversion between Boolean and Arithmetic Masking of Any OrderJean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala. 188-205 [doi]
- Making RSA-PSS Provably Secure against Non-random FaultsGilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz. 206-222 [doi]
- Side-Channel Attack against RSA Key Generation AlgorithmsAurélie Bauer, Éliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche. 223-241 [doi]
- Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCsDaniel Genkin, Itamar Pipman, Eran Tromer. 242-260 [doi]
- RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog DataNoboru Kunihiro, Junya Honda. 261-278 [doi]
- Simple Power Analysis on AES Key Expansion RevisitedChristophe Clavier, Damien Marion, Antoine Wurcker. 279-297 [doi]
- Efficient Pairings and ECC for Embedded SystemsThomas Unterluggauer, Erich Wenger. 298-315 [doi]
- Curve41417: Karatsuba RevisitedDaniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange. 316-334 [doi]
- Cofactorization on Graphics Processing UnitsAndrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra. 335-352 [doi]
- Enhanced Lattice-Based Signatures on Reconfigurable HardwareThomas Pöppelmann, Léo Ducas, Tim Güneysu. 353-370 [doi]
- Compact Ring-LWE CryptoprocessorSujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede. 371-391 [doi]
- ICEPOLE: High-Speed, Hardware-Oriented Authenticated EncryptionPawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wójcik. 392-413 [doi]
- FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel AttacksHai Brenner, Lubos Gaspar, Gaëtan Leurent, Alon Rosen, François-Xavier Standaert. 414-432 [doi]
- FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair ComparisonKhoongming Khoo, Thomas Peyrin, Axel York Poschmann, Huihui Yap. 433-450 [doi]
- Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede. 451-475 [doi]
- Efficient Power and Timing Side Channels for Physical Unclonable FunctionsUlrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Mehrdad Majzoobi, Farinaz Koushanfar, Wayne P. Burleson. 476-492 [doi]
- Physical Characterization of Arbiter PUFsShahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich. 493-509 [doi]
- Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAMDaniel E. Holcomb, Kevin Fu. 510-526 [doi]
- Embedded Evaluation of Randomness in Oscillator Based Elementary TRNGViktor Fischer, David Lubicz. 527-543 [doi]
- Entropy Evaluation for Oscillator-Based True Random Number GeneratorsYuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing. 544-561 [doi]
- Side-Channel Leakage through Static Power - Should We Care about in Practice?Amir Moradi. 562-579 [doi]
- Gate-Level Masking under a Path-Based Leakage MetricAndrew J. Leiserson, Mark E. Marson, Megan A. Wachs. 580-597 [doi]
- Early Propagation and Imbalanced Routing, How to Diminish in FPGAsAmir Moradi, Vincent Immler. 598-615 [doi]