Abstract is missing.
- Exploiting the Difference of Side-Channel LeakagesMichael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Stefan Mangard. 1-16 [doi]
- Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World ScenarioThomas Korak, Thomas Plos, Michael Hutter. 17-32 [doi]
- 700+ Attacks Published on Smart Cards: The Need for a Systematic Counter StrategyMathias Wagner. 33-38 [doi]
- An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA ImplementationWei He, Eduardo de la Torre, Teresa Riesgo. 39-53 [doi]
- An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream CiphersShohreh Sharif Mansouri, Elena Dubrova. 54-68 [doi]
- Conversion of Security Proofs from One Leakage Model to Another: A New IssueJean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala. 69-81 [doi]
- Attacking Exponent Blinding in RSA without CRTSven Bauer. 82-88 [doi]
- A New Scan Attack on RSA in Presence of Industrial CountermeasuresJean DaRolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Ingrid Verbauwhede. 89-104 [doi]
- RSA Key Generation: New AttacksCamille Vuillaume, Takashi Endo, Paul Wooderson. 105-119 [doi]
- A Fault Attack on the LED Block CipherPhilipp Jovanovic, Martin Kreuzer, Ilia Polian. 120-134 [doi]
- Differential Fault Analysis of Full LBlockLiang Zhao, Takashi Nishide, Kouichi Sakurai. 135-150 [doi]
- Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number GeneratorPierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer, François Poucheret, Bruno Robisson, Philippe Maurine. 151-166 [doi]
- A Closer Look at Security in Random Number Generators DesignViktor Fischer. 167-182 [doi]
- Same Values Power Analysis Using Special Points on Elliptic CurvesCédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst, David Naccache. 183-198 [doi]
- The Schindler-Itoh-attack in Case of Partial Information LeakageAlexander Krüger. 199-214 [doi]
- Butterfly-Attack on Skein's Modular AdditionMichael Zohner, Michael Kasper, Marc Stöttinger. 215-230 [doi]
- MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model ExploitationXin-jie Zhao, Fan Zhang, Shize Guo, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji. 231-248 [doi]
- Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector MachinesAnnelie Heuser, Michael Zohner. 249-264 [doi]