Abstract is missing.
- Security Risks Posed by Modern IC Debug and Diagnosis ToolsChristian Boit, Clemens Helfmeier, Uwe Kerst. 3-11 [doi]
- Hardware Trojan Horses in Cryptographic IP CoresShivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage. 15-29 [doi]
- Invasive PUF AnalysisDmitry Nedospasov, Jean-Pierre Seifert, Clemens Helfmeier, Christian Boit. 30-38 [doi]
- Improving and Evaluating Differential Fault Analysis on LED with Algebraic TechniquesXinJie Zhao, Shize Guo, Fan Zhang, Zhijie Shi, Chujiao Ma, Tao Wang. 41-51 [doi]
- Differential Fault Analysis of MICKEY-128 2.0Sandip Karmakar, Dipanwita Roy Chowdhury. 52-59 [doi]
- Improved Differential Fault Analysis of CLEFIASubidh Ali, Debdeep Mukhopadhyay. 60-70 [doi]
- Elliptic Curve Cryptosystems in the Presence of FaultsMarc Joye. 73 [doi]
- Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit MicrocontrollerNicolas Moro, Amine Dehbaoui, Karine Heydemann, Bruno Robisson, Emmanuelle Encrenaz. 77-88 [doi]
- Fault Model Analysis of Laser-Induced Faults in SRAM Memory CellsCyril Roscian, Alexandre Sarafianos, Jean-Max Dutertre, Assia Tria. 89-98 [doi]
- Fault Analysis of Infective AES ComputationsAlberto Battistello, Christophe Giraud. 101-107 [doi]
- Fault Attacks on AES with Faulty Ciphertexts OnlyThomas Fuhr, Éliane Jaulmes, Victor Lomné, Adrian Thillard. 108-118 [doi]
- Reverse Engineering of a Secret AES-like Cipher by Ineffective Fault AnalysisChristophe Clavier, Antoine Wurcker. 119-128 [doi]