Abstract is missing.
- Side-Channel Analysis on Blinded Regular Scalar MultiplicationsBenoit Feix, Mylène Roussellet, Alexandre Venelli. 3-20 [doi]
- Online Template AttacksLejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall. 21-36 [doi]
- Improved Multi-Bit Differential Fault Analysis of TriviumPrakash Dey, Avishek Adhikari. 37-52 [doi]
- Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel AnalysisBenoit Feix, Hugues Thiebeauld, Lucille Tordella. 53-67 [doi]
- On Constant-Round Concurrent Zero-Knowledge from a Knowledge AssumptionDivya Gupta, Amit Sahai. 71-88 [doi]
- Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom FunctionsNishanth Chandran, Sanjam Garg. 89-103 [doi]
- Linear Cryptanalysis of the PP-1 and PP-2 Block CiphersMichael Colburn, Liam Keliher. 107-123 [doi]
- On the Key Schedule of Lightweight Block CiphersJialin Huang, Serge Vaudenay, Xuejia Lai. 124-142 [doi]
- Cryptanalysis of Reduced-Round SIMON32 and SIMON48Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo. 143-160 [doi]
- General Application of FFT in Cryptanalysis and Improved Attack on CAST-256Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen. 161-176 [doi]
- Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013Subhadeep Banik, Anupam Chattopadhyay, Anusha Chowdhury. 179-196 [doi]
- EscApe: Diagonal Fault Analysis of APEDhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury. 197-216 [doi]
- Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-FunctionsInna Polak, Adi Shamir. 219-236 [doi]
- Linear Cryptanalysis of FASER128/256 and TriviA-ckChao Xu, Bin Zhang, Dengguo Feng. 237-254 [doi]
- Partial Key Exposure Attack on CRT-RSASantanu Sarkar, Ayineedi Venkateswarlu. 255-264 [doi]
- On the Leakage of Information in Biometric AuthenticationElena Pagnin, Christos Dimitrakakis, Aysajan Abidin, Aikaterini Mitrokotsa. 265-280 [doi]
- One Word/Cycle HC-128 Accelerator via State-Splitting OptimizationAyesha Khalid, Prasanna Ravi, Anupam Chattopadhyay, Goutam Paul. 283-303 [doi]
- A Very Compact FPGA Implementation of LED and PHOTONN. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann. 304-321 [doi]
- S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go?Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio De La Piedra, Dominik Sisejkovic. 322-337 [doi]
- Wire-Tap Codes as Side-Channel Countermeasure - - An FPGA-Based Experiment -Amir Moradi. 341-359 [doi]
- Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxesSumanta Sarkar, Subhamoy Maitra, Kaushik Chakraborty. 360-373 [doi]
- Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxesStjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic. 374-390 [doi]
- Binary Edwards Curves RevisitedKwang Ho Kim, Chol Ok Lee, Christophe Nègre. 393-408 [doi]
- Summation Polynomial Algorithms for Elliptic Curves in Characteristic TwoSteven D. Galbraith, Shishay W. Gebregiyorgis. 409-427 [doi]
- A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic CurvesJean-François Biasse, David Jao, Anirudh Sankar. 428-442 [doi]