Abstract is missing.
- Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature EngineeringNaila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong. 3-28 [doi]
- Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel AnalysisMaikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek. 29-48 [doi]
- On the Evaluation of Deep Learning-Based Side-Channel AnalysisLichao Wu, Guilherme Perin, Stjepan Picek. 49-71 [doi]
- A Second Look at the ASCAD DatabasesMaximilian Egger, Thomas Schamberger, Lars Tebelmann, Florian Lippert, Georg Sigl. 75-99 [doi]
- FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer AuthenticationRobert Schilling, Pascal Nasahl, Stefan Mangard. 100-124 [doi]
- Body Biasing Injection: To Thin or Not to Thin the Substrate?G. Chancel, Jean Marc Gallière, Philippe Maurine. 125-139 [doi]
- On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical AttacksLennert Wouters, Benedikt Gierlichs, Bart Preneel. 143-163 [doi]
- Single-Trace Clustering Power Analysis of the Point-Swapping Procedure in the Three Point Ladder of Cortex-M4 SIKEAymeric Genêt, Novak Kaluderovic. 164-192 [doi]
- Canonical DPA Attack on HMAC-SHA1/SHA2Frank Schuhmacher. 193-211 [doi]
- Provable Secure Software Masking in the Real-WorldArthur Beckers, Lennert Wouters, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede. 215-235 [doi]
- Systematic Study of Decryption and Re-encryption Leakage: The Case of KyberMelissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider 0002, François-Xavier Standaert. 236-256 [doi]
- Handcrafting: Improving Automated Masking in Hardware with Manual OptimizationsCharles Momin, Gaëtan Cassiers, François-Xavier Standaert. 257-275 [doi]