Abstract is missing.
- Robust Profiling for DPA-Style AttacksCarolyn Whitnall, Elisabeth Oswald. 3-21 [doi]
- Less is More - Dimensionality Reduction from a Theoretical PerspectiveNicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul. 22-41 [doi]
- Blind Source Separation from Single Measurements Using Singular Spectrum AnalysisSantos Merino Del Pozo, François-Xavier Standaert. 42-59 [doi]
- 8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES DesignRei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki. 63-80 [doi]
- NaCl's Crypto_box in HardwareMichael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser. 81-101 [doi]
- Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 GatesSujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede. 102-122 [doi]
- Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECCKarim Bigou, Arnaud Tisserand. 123-140 [doi]
- Accelerating Homomorphic Evaluation on Reconfigurable HardwareThomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrián Macías. 143-163 [doi]
- Modular Hardware Architecture for Somewhat Homomorphic Function EvaluationSujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede. 164-184 [doi]
- Accelerating LTV Based Homomorphic Encryption in Reconfigurable HardwareYarkin Doröz, Erdinç Öztürk, Erkay Savas, Berk Sunar. 185-204 [doi]
- Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed ExponentiationDaniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer. 207-228 [doi]
- Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSAWerner Schindler. 229-247 [doi]
- Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel PlatformsSarani Bhattacharya, Debdeep Mukhopadhyay. 248-266 [doi]
- Improved Cryptanalysis of the DECT Standard CipherIwen Coisel, Ignacio Sanchez. 269-286 [doi]
- Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce BitsAurélie Bauer, Damien Vergnaud. 287-306 [doi]
- The Simeck Family of Lightweight Block CiphersGangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong. 307-329 [doi]
- TriviA: A Fast and Secure Authenticated Encryption SchemeAvik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi. 330-353 [doi]
- A Physical Approach for Stochastic Modeling of TERO-Based TRNGPatrick Haddad, Viktor Fischer, Florent Bernard, Jean Nicolai. 357-372 [doi]
- Predictive Models for Min-entropy EstimationJohn Kelsey, Kerry A. McKay, Meltem Sönmez Turan. 373-392 [doi]
- Improved Side-Channel Analysis of Finite-Field MultiplicationSonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff. 395-415 [doi]
- Evaluation and Improvement of Generic-Emulating DPA AttacksWeijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu. 416-432 [doi]
- Transient-Steady Effect Attack on Block CiphersYanting Ren, an Wang, Liji Wu. 433-450 [doi]
- Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads?Amir Moradi, Alexander Wild. 453-474 [doi]
- Multi-variate High-Order Attacks of Shuffled Tables RecomputationNicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia. 475-494 [doi]
- Leakage Assessment Methodology - A Clear Roadmap for Side-Channel EvaluationsTobias Schneider, Amir Moradi. 495-513 [doi]
- Secure Key Generation from Biased PUFsRoel Maes, Vincent van der Leest, Erik van der Sluis, Frans Willems. 517-534 [doi]
- The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFsGeorg T. Becker. 535-555 [doi]
- End-To-End Design of a PUF-Based Privacy Preserving Authentication ProtocolAydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung. 556-576 [doi]
- Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean SatisfiabilitySayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay. 577-596 [doi]
- DPA, Bitslicing and Masking at 1 GHzJosep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede. 599-619 [doi]
- SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-ChipJake Longo Galea, Elke De Mulder, Dan Page, Michael Tunstall. 620-640 [doi]
- Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage ContrastChristian Kison, Jürgen Frinken, Christof Paar. 641-660 [doi]
- Efficient Ring-LWE Encryption on 8-Bit AVR ProcessorsZhe Liu 0001, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede. 663-682 [doi]
- A Masked Ring-LWE ImplementationOscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede. 683-702 [doi]