Abstract is missing.
- Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM MeasurementsRobert Specht, Johann Heyszl, Martin Kleinsteuber, Georg Sigl. 3-19 [doi]
- Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)Liran Lerman, Romain Poussier, Gianluca Bontempi, Olivier Markowitch, François-Xavier Standaert. 20-33 [doi]
- Efficient Selection of Time Samples for Higher-Order DPA with Projection PursuitsFrançois Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville. 34-50 [doi]
- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace AttacksValentina Banciu, Elisabeth Oswald, Carolyn Whitnall. 51-63 [doi]
- Two Operands of Multipliers in Side-Channel AttackTakeshi Sugawara, Daisuke Suzuki, Minoru Saeki. 64-78 [doi]
- Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAsAlexander Wild, Amir Moradi, Tim Güneysu. 81-94 [doi]
- Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory PrimitivesPascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu. 95-107 [doi]
- A Faster and More Realistic Flush+Reload Attack on AESBerk Gülmezoglu, Mehmet Sinan Inci, Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar. 111-126 [doi]
- Faster Software for Fast EndomorphismsBilly Bob Brumley. 127-140 [doi]
- Toward Secure Implementation of McEliece DecryptionMariya Georgieva, Frédéric de Portzamparc. 141-156 [doi]
- Fault Injection with a New Flavor: Memetic Algorithms Make a DifferenceStjepan Picek, Lejla Batina, Pieter Buzing, Domagoj Jakobovic. 159-173 [doi]
- Differential Fault Intensity Analysis on PRESENT and LED Block CiphersNahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont. 174-188 [doi]
- A Biased Fault Attack on the Time Redundancy Countermeasure for AESSikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen, Debdeep Mukhopadhyay. 189-203 [doi]
- Faster Mask Conversion with Lookup TablesPraveen Kumar Vadnala, Johann Großschädl. 207-221 [doi]
- Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASICMichael Muehlberghuber, Thomas Korak, Philipp Dunst, Michael Hutter. 222-236 [doi]
- Side-Channel Security Analysis of Ultra-Low-Power FRAM-Based MCUsAmir Moradi, Gesine Hinterwälder. 239-254 [doi]
- Side Channel Attacks on Smartphones and Embedded Devices Using Standard Radio EquipmentGabriel Goller, Georg Sigl. 255-270 [doi]