Abstract is missing.
- Compositional Verification of Security Properties for Embedded Execution PlatformsChristoph Baumann, Oliver Schwarz, Mads Dam. 1-16 [doi]
- Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly CodesInès Ben El Ouahma, Quentin L. Meunier, Karine Heydemann, Emmanuelle Encrenaz. 17-32 [doi]
- Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier OperandsPoulami Das 0003, Debapriya Basu Roy, Debdeep Mukhopadhyay. 33-49 [doi]
- An Automated Framework for Exploitable Fault Identification in Block Ciphers - A Data Mining ApproachSayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta. 50-67 [doi]
- Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFsNils Wisiol, Christoph Graebnitz, Marian Margraf, Manuel Oswald, Tudor A. A. Soroceanu, Benjamin Zengin. 68-83 [doi]