Abstract is missing.
- Speeding up Curve25519 using Toeplitz Matrix-vector MultiplicationHalil Kemal Taskin, Murat Cenk. 1-6 [doi]
- Exploring the Vulnerability of R-LWE Encryption to Fault AttacksFelipe Valencia, Tobias Oder, Tim Güneysu, Francesco Regazzoni. 7-12 [doi]
- TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor NetworksLuciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti. 13-16 [doi]
- All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded SystemsDamien Couroussé, Thierno Barry, Bruno Robisson, Nicolas Belleville, Philippe Jaillon, Olivier Potin, Hélène Le Bouder, Jean-Louis Lanet, Karine Heydemann. 17-18 [doi]
- Automotive Cyber Security: Lessons Learned and Research ChallengesFlavio D. Garcia. 19 [doi]
- rev.ng: A Tale of Reverse Engineering, Dynamic Analysis and Translation of Binaries Using QEMU and LLVMAlessandro Di Federico. 20 [doi]