Abstract is missing.
- Tampering Attacks in Pairing-Based CryptographyJohannes Blömer, Peter Günther, Gennadij Liske. 1-7 [doi]
- On the Effects of Clock and Power Supply Tampering on Two Microcontroller PlatformsThomas Korak, Michael Hoefler. 8-17 [doi]
- Parametric Trojans for Fault-Injection Attacks on Cryptographic HardwareRaghavan Kumar, Philipp Jovanovic, Wayne P. Burleson, Ilia Polian. 18-28 [doi]
- Algebraic Fault Analysis on GOST for Key Recovery and Reverse EngineeringXinJie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Jerry Shi, Chujiao Ma, Dawu Gu. 29-39 [doi]
- Differential Fault Analysis on the Families of SIMON and SPECK CiphersHarshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay. 40-48 [doi]
- Differential Fault Intensity AnalysisNahid Farhady Ghalaty, Bilgiday Yuce, Mostafa M. I. Taha, Patrick Schaumont. 49-58 [doi]
- Fault Sensitivity Analysis Meets Zero-Value AttackOliver Mischke, Amir Moradi, Tim Güneysu. 59-67 [doi]
- Countermeasures against High-Order Fault-Injection Attacks on CRT-RSAPablo Rauzy, Sylvain Guilley. 68-82 [doi]
- On Fault Injections in Generalized Feistel NetworksHélène Le Bouder, Gaël Thomas, Yanis Linge, Assia Tria. 83-93 [doi]
- Blind Fault Attack against SPN CiphersRoman Korkikian, Sylvain Pelissier, David Naccache. 94-103 [doi]
- Clock Glitch Attacks in the Presence of HeatingThomas Korak, Michael Hutter, Baris Ege, Lejla Batina. 104-114 [doi]
- Practical Validation of Several Fault Attacks against the Miller AlgorithmRonan Lashermes, Marie Paindavoine, Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin. 115-122 [doi]
- A Practical Second-Order Fault Attack against a Real-World Pairing ImplementationJohannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert. 123-136 [doi]