Abstract is missing.
- Attacks on Encrypted Memory and Constructions for Memory ProtectionShay Gueron. 1-3 [doi]
- Differential Fault Analysis of SHA3-224 and SHA3-256Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding. 4-15 [doi]
- Improved Fault Analysis on SIMON Block Cipher FamilyHua Chen, Jingyi Feng, Vincent Rijmen, Yunwen Liu, Limin Fan, Wei Li. 16-24 [doi]
- Controlling PC on ARM Using Fault InjectionNiek Timmers, Albert Spruyt, Marc Witteman. 25-35 [doi]
- Attack on a DFA Protected AES by Simultaneous Laser Fault InjectionsBodo Selmke, Johann Heyszl, Georg Sigl. 36-46 [doi]
- Software Fault Resistance is Futile: Effective Single-Glitch AttacksBilgiday Yuce, Nahid Farhady Ghalaty, Harika Santapuri, Chinmay Deshpande, Conor Patrick, Patrick Schaumont. 47-58 [doi]
- Continuous-Time Computational Aspects of Cyber-Physical SecuritySam Green, Ihsan Cicek, Çetin Kaya Koc. 59-62 [doi]
- Lattice-Based Signature Schemes and Their Sensitivity to Fault AttacksNina Bindel, Johannes A. Buchmann, Juliane Krämer. 63-77 [doi]
- An Embedded Digital Sensor against EM and BB Fault InjectionDavid El-Baze, Jean-Baptiste Rigaud, Philippe Maurine. 78-86 [doi]
- Fault Tolerant Implementations of Delay-Based Physically Unclonable Functions on FPGADurga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty. 87-101 [doi]
- Ring Oscillator under Laser: Potential of PLL-based Countermeasure against Laser Fault InjectionWei He, Jakub Breier, Shivam Bhasin, Noriyuki Miura, Makoto Nagata. 102-113 [doi]
- More Efficient Private Circuits II through Threshold ImplementationsThomas De Cnudde, Svetla Nikova. 114-124 [doi]