Abstract is missing.
- Correlated Extra-Reductions Defeat Blinded Regular ExponentiationMargaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul. 3-22 [doi]
- Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking SchemeAlberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun. 23-39 [doi]
- Towards Easy Leakage CertificationFrançois Durvaux, François-Xavier Standaert, Santos Merino Del Pozo. 40-60 [doi]
- Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated ApproachRomain Poussier, François-Xavier Standaert, Vincent Grosso. 61-81 [doi]
- Physical Layer Group Key Agreement for Automotive Controller Area NetworksShalabh Jain, Jorge Guajardo. 85-105 [doi]
- - vatiCAN - Vetted, Authenticated CAN BusStefan Nürnberger, Christian Rossow. 106-124 [doi]
- Mitigating SAT Attack on Logic LockingYang Xie, Ankur Srivastava. 127-146 [doi]
- No Place to Hide: Contactless Probing of Secret Data on FPGAsHeiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert. 147-167 [doi]
- Strong 8-bit Sboxes with Efficient Masking in HardwareErik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi 0001, Tobias Schneider. 171-193 [doi]
- Masking AES with d+1 Shares in HardwareThomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen. 194-212 [doi]
- Differential Computation Analysis: Hiding Your White-Box Designs is Not EnoughJoppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen. 215-236 [doi]
- Antikernel: A Decentralized Secure Hardware-Software Operating System ArchitectureAndrew D. Zonenberg, Bülent Yener. 237-256 [doi]
- Software Implementation of Koblitz Curves over Quadratic FieldsThomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez. 259-279 [doi]
- QcBits: Constant-Time Small-Key Code-Based CryptographyTung Chou. 280-300 [doi]
- \mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on MicrocontrollersJoost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina. 301-320 [doi]
- Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature SchemeLeon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom. 323-345 [doi]
- CacheBleed: A Timing Attack on OpenSSL Constant Time RSAYuval Yarom, Daniel Genkin, Nadia Heninger. 346-367 [doi]
- Cache Attacks Enable Bulk Key Recovery on the CloudMehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar. 368-388 [doi]
- Strong Machine Learning Attack Against PUFs with No Mathematical ModelFatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert. 391-411 [doi]
- Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and ApplicationsJeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu. 412-431 [doi]
- Run-Time Accessible DRAM PUFs in Commodity DevicesWenjie Xiong, André Schaller, Nikolaos Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser 0001, Jakub Szefer. 432-453 [doi]
- On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order MaskingDahmun Goudarzi, Matthieu Rivain. 457-478 [doi]
- Reducing the Number of Non-linear Multiplications in Masking SchemesJürgen Pulkus, Srinivas Vivek. 479-497 [doi]
- Faster Evaluation of SBoxes via Common SharesJean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun. 498-514 [doi]
- Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic FieldsKimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa. 517-537 [doi]
- A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode ImplementationRei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki. 538-558 [doi]
- Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA ClusteringMarkus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner. 559-577 [doi]
- EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQDhiman Saha, Dipanwita Roy Chowdhury. 581-601 [doi]
- Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing AnalysisSarani Bhattacharya, Debdeep Mukhopadhyay. 602-624 [doi]
- A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug AttacksSamaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar. 625-647 [doi]