Abstract is missing.
- Breaking Cryptographic Implementations Using Deep Learning TechniquesHoussem Maghrebi, Thibault Portigliatti, Emmanuel Prouff. 3-26 [doi]
- Cheap and Cheerful: A Low-Cost Digital Sensor for Detecting Laser Fault Injection AttacksWei He, Jakub Breier, Shivam Bhasin. 27-46 [doi]
- Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGAWei He, Jakub Breier, Shivam Bhasin, Dirmanto Jap, Hock Guan Ong, Chee Lip Gan. 47-65 [doi]
- Fault Based Almost Universal Forgeries on CLOC and SILCDebapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi. 66-86 [doi]
- Implementing Complete Formulas on Weierstrass Curves in HardwarePedro Maat C. Massolino, Joost Renes, Lejla Batina. 89-108 [doi]
- Partially Homomorphic Encryption Schemes over Finite FieldsJian Liu, Sihem Mesnager, Lusheng Chen. 109-123 [doi]
- Light Weight Key Establishment Scheme for Wireless Sensor NetworksPayingat Jilna, P. P. Deepthi. 124-137 [doi]
- A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPsAmine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout. 138-156 [doi]
- Spectral Characterization of Iterating Lossy MappingsJoan Daemen. 159-178 [doi]
- Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study Using PRINCERavikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy. 179-193 [doi]
- Gain: Practical Key-Recovery Attacks on Round-reduced PAEQDhiman Saha, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury. 194-210 [doi]
- Predictive Aging of Reliability of Two Delay PUFsNaghmeh Karimi, Jean-Luc Danger, Florent Lozach, Sylvain Guilley. 213-232 [doi]
- Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd RandomizersDina Kamel, Guerric de Streel, Santos Merino Del Pozo, Kashif Nawaz, François-Xavier Standaert, Denis Flandre, David Bol. 233-248 [doi]
- Enabling Secure Web Payments with GNU TalerJeffrey Burdges, Florian Dold, Christian Grothoff, Marcello Stanisci. 251-270 [doi]
- Malware Characterization Using Windows API Call SequencesSanchit Gupta, Harshit Sharma, Sarvjeet Kaur. 271-280 [doi]
- VMI Based Automated Real-Time Malware Detector for Virtualized Cloud EnvironmentAjay Kumara M. A., Jaidhar C. D.. 281-300 [doi]
- MQ with Grover's AlgorithmPeter Schwabe, Bas Westerbaan. 303-322 [doi]
- Ring-LWE: Applications to Cryptography and Their Efficient RealizationSujoy Sinha Roy, Angshuman Karmakar, Ingrid Verbauwhede. 323-331 [doi]
- NewHope on ARM Cortex-MErdem Alkim, Philipp Jakubeit, Peter Schwabe. 332-349 [doi]
- Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I (Invited Talk)François-Xavier Standaert. 353-362 [doi]
- A Methodology for the Characterisation of Leakages in Combinatorial LogicGuido Bertoni, Marco Martinoli. 363-382 [doi]
- Exploiting the Leakage: Analysis of Some Authenticated Encryption SchemesDonghoon Chang, Amit Kumar Chauhan, Naina Gupta, Arpan Jati, Somitra Kumar Sanadhya. 383-401 [doi]
- Breaking Kalyna 128/128 with Power AttacksStephane Fernandes Medeiros, François Gérard, Nikita Veshchikov, Liran Lerman, Olivier Markowitch. 402-414 [doi]
- Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms - A TutorialShivam Bhasin, Debdeep Mukhopadhyay. 415-418 [doi]