Abstract is missing.
- Persistent Fault Analysis with Few EncryptionsSébastien Carré, Sylvain Guilley, Olivier Rioul. 3-24 [doi]
- A Template Attack to Reconstruct the Input of SHA-3 on an 8-Bit DeviceShih-Chun You, Markus G. Kuhn. 25-42 [doi]
- Single-Trace Side-Channel Analysis on Polynomial-Based MAC SchemesRei Ueno, Kazuhide Fukushima, Yuto Nakano, Shinsaku Kiyomoto, Naofumi Homma. 43-67 [doi]
- Wavelet Scattering Transform and Ensemble Methods for Side-Channel AnalysisGabriel Destouet, Cécile Dumas, Anne Frassati, Valérie Perrier. 71-89 [doi]
- Scatter: a Missing Case?Yuanyuan Zhou 0006, Sébastien Duval, François-Xavier Standaert. 90-103 [doi]
- Augmenting Leakage Detection Using BootstrappingYuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont. 104-119 [doi]
- Security Assessment of White-Box Design Submissions of the CHES 2017 CTF ChallengeEstuardo Alpirez Bock, Alexander Treff. 123-146 [doi]
- On the Implementation Efficiency of Linear Regression-Based Side-Channel AttacksMaamar Ouladj, Sylvain Guilley, Emmanuel Prouff. 147-172 [doi]
- Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel AnalysisDaan van der Valk, Stjepan Picek, Shivam Bhasin. 175-199 [doi]
- Online Performance Evaluation of Deep Learning Networks for Profiled Side-Channel AnalysisDamien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard. 200-218 [doi]
- Custom Instruction Support for Modular Defense Against Side-Channel and Fault AttacksPantea Kiaei, Darius Mercadier, Pierre-Évariste Dagand, Karine Heydemann, Patrick Schaumont. 221-253 [doi]
- Processor Anchor to Increase the Robustness Against Fault Injection and Cyber AttacksJean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, Abdelmalek Si-Merabet, Michaël Timbert, Baptiste Pecatte. 254-274 [doi]
- Integrating Side Channel Security in the FPGA Hardware Design FlowAlessandro Barenghi, Matteo Brevi, William Fornaciari, Gerardo Pelosi, Davide Zoni. 275-290 [doi]
- Self-secured PUF: Protecting the Loop PUF by MaskingLars Tebelmann, Jean-Luc Danger, Michael Pehl. 293-314 [doi]
- Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom FunctionsJuliane Krämer, Patrick Struck. 315-337 [doi]