Abstract is missing.
- From Cryptography to Hardware: Analyzing Embedded Xilinx BRAM for Cryptographic ApplicationsShivam Bhasin, Sylvain Guilley, Jean-Luc Danger. 1-8 [doi]
- Power analysis of hardware implementations protected with secret sharingGuido Bertoni, Joan Daemen, Nicolas Debande, Thanh-Ha Le, Michael Peeters, Gilles Van Assche. 9-16 [doi]
- Hardware Prefetchers Leak: A Revisit of SVF for Cache-Timing AttacksSarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay. 17-23 [doi]
- PHAP: Password based Hardware Authentication using PUFsRaghavan Kumar, Wayne Burleson. 24-31 [doi]
- Wavelet transform based pre-processing for side channel analysisNicolas Debande, Youssef Souissi, M. Abdelaziz Elaabid, Sylvain Guilley, Jean-Luc Danger. 32-38 [doi]
- An 8-bit AVR-Based Elliptic Curve Cryptographic RISC Processor for the Internet of ThingsErich Wenger, Johann Großschädl. 39-46 [doi]
- Security verification of hardware-enabled attestation protocolsTianwei Zhang, Jakub Szefer, Ruby B. Lee. 47-54 [doi]
- Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-DisplayTao Feng, Ziyi Liu, Bogdan Carbunar, Dainis Boumber, Weidong Shi. 55-62 [doi]
- Dynamic acceleration of multithreaded program critical paths in near-threshold systemsHyoun Kyu Cho, Scott A. Mahlke. 63-67 [doi]
- Low-Latency Mechanisms for Near-Threshold Operation of Private Caches in Shared Memory MulticoresFarrukh Hijaz, Qingchuan Shi, Omer Khan. 68-73 [doi]
- Performance and Power Solutions for Caches Using 8T SRAM CellsMostafa Farahani, Amirali Baniasadi. 74-80 [doi]