Abstract is missing.
- SAMVA: Static Analysis for Multi-fault Attack Paths DeterminationAntoine Gicquel, Damien Hardy, Karine Heydemann, Erven Rohou. 3-22 [doi]
- Efficient Attack-Surface Exploration for Electromagnetic Fault InjectionDaniele Antonio Emanuele Carta, Vittorio Zaccaria, Gabriele Quagliarella, Maria Chiara Molteni. 23-41 [doi]
- A CCFI Verification Scheme Based on the RISC-V Trace EncoderAnthony Zgheib, Olivier Potin, Jean-Baptiste Rigaud, Jean-Max Dutertre. 42-61 [doi]
- ASCA vs. SASCA - A Closer Look at the AES Key ScheduleEmanuele Strieder, Manuel Ilg, Johann Heyszl, Florian Unterstein, Silvan Streit. 65-85 [doi]
- Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked EncodingsJulien Béguinot, Wei Cheng 0003, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert. 86-104 [doi]
- Improving Side-channel Leakage Assessment Using Pre-silicon Leakage ModelsDillibabu Shanmugam, Patrick Schaumont. 105-124 [doi]
- Fast First-Order Masked NTTRUDaniel Heinz, Gabi Dreo Rodosek. 127-148 [doi]
- On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDTSoundes Marzougui, Ievgen Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert. 149-169 [doi]
- Punctured Syndrome Decoding Problem - Efficient Side-Channel Attacks Against Classic McElieceVincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi. 170-192 [doi]
- Energy Consumption of Protected Cryptographic Hardware Cores - An Experimental StudyAein Rezaei Shahmirzadi, Thorben Moos, Amir Moradi 0001. 195-220 [doi]
- Whiteboxgrind - Automated Analysis of Whitebox CryptographyTobias Holl, Katharina Bogad, Michael Gruber. 221-240 [doi]
- White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based ObfuscationShashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven J. Watson. 241-261 [doi]