Abstract is missing.
- Securing Flash TechnologyHelena Handschuh, Elena Trichina. 3-17 [doi]
- How can we overcome both side channel analysis and fault attacks on RSA-CRT?Chong Hee Kim, Jean-Jacques Quisquater. 21-29 [doi]
- Montgomery Multiplication with Redundancy CheckKhanh Nguyen, Michael Tunstall. 30-36 [doi]
- Fault Detection Structures for the Montgomery Multiplication over Binary Extension FieldsArash Hariri, Arash Reyhani-Masoleh. 37-46 [doi]
- A Structure-independent Approach for Fault Detection Hardware Implementations of the Advanced Encryption StandardMehran Mozaffari Kermani, Arash Reyhani-Masoleh. 47-53 [doi]
- A Novel Double-Data-Rate AES Architecture Resistant against Fault InjectionPaolo Maistri, Pierre Vanhauwaert, Régis Leveugle. 54-61 [doi]
- DFA Mechanism on the AES Key ScheduleJunko Takahashi, Toshinori Fukunaga, Kimihiro Yamakoshi. 62-74 [doi]
- Countermeasures against Branch Target Buffer AttacksGiovanni Agosta, Luca Breveglieri, Gerardo Pelosi, Israel Koren. 75-79 [doi]
- Cheap Hardware Parallelism Implies Cheap SecurityOnur Aciiçmez, Jean-Pierre Seifert. 80-91 [doi]
- Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel AnalysisFrederic Amiel, Karine Villegas, Benoit Feix, Louis Marcel. 92-102 [doi]
- Tate Pairing with Strong Fault ResiliencyErdinç Öztürk, Gunnar Gaubatz, Berk Sunar. 103-111 [doi]
- Register Transfer Level Concurrent Error Detection in Elliptic Curve Crypto ImplementationsRichard Stern, Nikhil Joshi, Kaijie Wu, Ramesh Karri. 112-119 [doi]