Abstract is missing.
- Compilation of a Countermeasure Against Instruction-Skip Fault AttacksThierno Barry, Damien Couroussé, Bruno Robisson. 1-6 [doi]
- A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature SchemesHermann Seuschek, Johann Heyszl, Fabrizio De Santis. 7-12 [doi]
- Practical Aspects of Quantization and Tamper-Sensitivity for Physically Obfuscated KeysVincent Immler, Maxim Hennig, Ludwig Kürzinger, Georg Sigl. 13-18 [doi]
- Mode-based Obfuscation using Control-Flow ModificationsSandhya Koteshwara, Chris H. Kim, Keshab K. Parhi. 19-24 [doi]
- Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic CurvesReza Azarderakhsh, Koray Karabina. 25-30 [doi]
- Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory AccessesAhmed Saeed, Ali Ahmadinia, Mike Just. 31-36 [doi]
- AEGIS-Based Efficient Solution for Secure Reconfiguration of FPGAsKarim M. Abdellatif, Roselyne Chotin-Avot, Habib Mehrez. 37-40 [doi]
- A High Speed Scalar Multiplier for Binary Edwards CurvesApostolos P. Fournaris, Nicolas Sklavos, Christos Koulamas. 41-44 [doi]
- Differential Fault Attack on SIMECKVenu Nalla, Rajeev Anand Sahu, Vishal Saraswat. 45-48 [doi]
- Body Biasing Injection Attacks in PracticeNoemie Beringuier-Boher, Marc Lacruche, David El-Baze, Jean-Max Dutertre, Jean-Baptiste Rigaud, Philippe Maurine. 49-54 [doi]