Abstract is missing.
- A Side-Channel Assisted Cryptanalytic Attack Against QcBitsMelissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson. 3-23 [doi]
- Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of LeakagesChristophe Clavier, Léo Reynaud. 24-44 [doi]
- Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processingEleonora Cagli, Cécile Dumas, Emmanuel Prouff. 45-68 [doi]
- CacheZoom: How SGX Amplifies the Power of Cache AttacksAhmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth. 69-90 [doi]
- High-Order Conversion from Boolean to Arithmetic MaskingJean-Sébastien Coron. 93-114 [doi]
- Reconciling d+1 Masking in Hardware and SoftwareHannes Groß, Stefan Mangard. 115-136 [doi]
- Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold SharingJoan Daemen. 137-153 [doi]
- Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel CountermeasuresDahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek. 154-171 [doi]
- Nanofocused X-Ray Beam to Reprogram Secure CircuitsStéphanie Anceau, Pierre Bleuet, Jessy Clédière, Laurent Maingault, Jean-Luc Rainard, Rémi Tucoulou. 175-188 [doi]
- Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking AttacksXiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte. 189-210 [doi]
- McBits RevisitedTung Chou. 213-231 [doi]
- High-Speed Key Encapsulation from NTRUAndreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe. 232-252 [doi]
- FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa CodesWen Wang, Jakub Szefer, Ruben Niederhagen. 253-274 [doi]
- Blockcipher-Based Authenticated Encryption: How Small Can We Go?Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi. 277-298 [doi]
- Gimli : A Cross-Platform PermutationDaniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider 0002, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier. 299-320 [doi]
- GIFT: A Small Present - Towards Reaching the Limit of Lightweight EncryptionSubhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo. 321-345 [doi]
- Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control DevicesBjörn Haase, Benoît Labrique. 346-364 [doi]
- Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation ToolsMarios O. Choudary, P. G. Popescu. 367-386 [doi]
- Fast Leakage AssessmentOscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede. 387-399 [doi]
- Your Rails Cannot Hide from Localized EM: How Dual-Rail Logic Fails on FPGAsVincent Immler, Robert Specht, Florian Unterstein. 403-424 [doi]
- How to Break Secure Boot on FPGA SoCs Through Malicious HardwareNisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl. 425-442 [doi]
- Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive ApplicationsHocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim. 445-467 [doi]
- Hacking in the Blind: (Almost) Invisible Runtime User Interface AttacksLuka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun. 468-489 [doi]
- On the Security of Carrier Phase-Based RangingHildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun. 490-509 [doi]
- Single-Trace Side-Channel Attacks on Masked Lattice-Based EncryptionRobert Primas, Peter Pessl, Stefan Mangard. 513-533 [doi]
- A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal AttacksRomain Poussier, Yuanyuan Zhou, François-Xavier Standaert. 534-554 [doi]
- Sliding Right into Disaster: Left-to-Right Sliding Windows LeakDaniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom. 555-576 [doi]
- Faster Homomorphic Function Evaluation Using Non-integral Base EncodingCharlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren. 579-600 [doi]
- Hiding Secrecy Leakage in Leaky Helper DataMatthias Hiller, Aysun Gurur Önalan. 601-619 [doi]
- Very High Order Masking: Efficient Implementation and Security EvaluationAnthony Journault, François-Xavier Standaert. 623-643 [doi]
- PRESENT Runs Fast - Efficient and Secure Implementation in SoftwareTiago B. S. Reis, Diego F. Aranha, Julio López. 644-664 [doi]
- Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel AttacksZhe Liu 0001, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo. 665-686 [doi]
- Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNYJérémy Jean, Amir Moradi 0001, Thomas Peyrin, Pascal Sasdrich. 687-707 [doi]