Abstract is missing.
- SideLine: How Delay-Lines (May) Leak Secrets from Your SoCJoseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi. 3-30 [doi]
- First Full-Fledged Side Channel Attack on HMAC-SHA-2Yaacov Belenky, Ira Dushar, Valery Teper, Hennadii Chernyshchyk, Leonid Azriel, Yury Kreimer. 31-52 [doi]
- Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel AnalysisGuilherme Perin, Ileana Buhan, Stjepan Picek. 53-81 [doi]
- Transform Without Encode is not Sufficient for SIFA and FTA Security: A Case StudySayandeep Saha, Debdeep Mukhopadhyay. 85-104 [doi]
- Generalizing Statistical Ineffective Fault Attacks in the Spirit of Side-Channel AttacksGuillaume Barbu, Laurent Castelnovi, Thomas Chabrier. 105-125 [doi]
- Protecting Secure ICs Against Side-Channel Attacks by Identifying and Quantifying Potential EM and Leakage Hotspots at Simulation StageDavide Poggi, Philippe Maurine, Thomas Ordas, Alexandre Sarafianos. 129-147 [doi]
- Low-Latency Hardware Masking of PRINCENicolai Müller, Thorben Moos, Amir Moradi 0001. 148-167 [doi]
- Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAPBalazs Udvarhelyi, Olivier Bronchain, François-Xavier Standaert. 168-183 [doi]
- White-Box ECDSA: Challenges and Existing SolutionsEmmanuelle Dottax, Christophe Giraud 0001, Agathe Houzelot. 184-201 [doi]
- On Using RSA/ECC Coprocessor for Ideal Lattice-Based Key ExchangeAurélien Greuet, Simon Montoya, Guénaël Renault. 205-227 [doi]
- Full Key Recovery Side-Channel Attack Against Ephemeral SIKE on the Cortex-M4Aymeric Genêt, Natacha Linard de Guertechin, Novak Kaluderovic. 228-254 [doi]
- Resistance of Isogeny-Based Cryptographic Implementations to a Fault AttackÉlise Tasso, Luca De Feo, Nadia El Mrabet, Simon Pontié. 255-276 [doi]
- Analysis and Protection of the Two-Metric Helper Data SchemeLars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl. 279-302 [doi]
- Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power AttacksTrevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi. 303-321 [doi]