-
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
, 23-40,
Sergei Skorobogatov
,
Christopher Woods
bib info
-
Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us
, 41-57,
Jean-Pierre Seifert
,
Alexander Schlösser
,
Dmitry Nedospasov
,
Juliane Krämer
,
Susanna Orlic
bib info
-
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
, 76-91,
Vincent Rijmen
,
Ventzislav Nikov
,
Svetla Nikova
,
Begül Bilgin
,
Georg Stütz
bib info
-
How Far Should Theory Be from Practice? - Evaluation of a Countermeasure
, 92-106,
Amir Moradi
,
Oliver Mischke
bib info
-
Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking
, 107-121,
Blandine Debraize
bib info
-
A Differential Fault Attack on the Grain Family of Stream Ciphers
, 122-139,
Subhamoy Maitra
,
Santanu Sarkar
,
Subhadeep Banik
bib info
-
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
, 140-154,
François-Xavier Standaert
,
Avishai Wool
,
Mathieu Renauld
,
Yossef Oren
bib info
-
Selecting Time Samples for Multivariate DPA Attacks
, 155-174,
Ingrid Verbauwhede
,
Benedikt Gierlichs
,
Oscar Reparaz
bib info
-
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting
, 175-192,
François-Xavier Standaert
,
Benoît Gérard
bib info
NULL
-
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
, 193-212,
Antoine Joux
,
François-Xavier Standaert
,
Marcel Medwed
bib info
-
Practical Leakage-Resilient Symmetric Cryptography
, 213-232,
Krzysztof Pietrzak
,
Sebastian Faust
,
Joachim Schipper
bib info
-
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
, 233-250,
Yunsi Fei
,
Qiasi Luo
,
A. Adam Ding
bib info
-
Practical Security Analysis of PUF-Based Two-Player Protocols
, 251-267,
Marten van Dijk
,
Ulrich Rührmair
bib info
-
Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment
, 268-282,
Bart Preneel
,
Vincent van der Leest
,
Erik van der Sluis
bib info
-
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
, 283-301,
Ahmad-Reza Sadeghi
,
Ingrid Verbauwhede
,
Stefan Katzenbeisser
,
Christian Wachsmann
,
Ünal Koçabas
,
Vladimir Rozic
bib info
-
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
, 302-319,
Ingrid Verbauwhede
,
Roel Maes
,
Anthony Van Herrewege
bib info
-
Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware
, 340-355,
Stefan Heyse
,
Tim Güneysu
bib info
-
Solving Quadratic Equations with XL on Parallel Architectures
, 356-373,
Bo-Yin Yang
,
Chen-Mou Cheng
,
Ruben Niederhagen
,
Tung Chou
bib info
-
Efficient Implementations of MQPKS on Constrained Devices
, 374-389,
Stefan Heyse
,
Enrico Thomae
,
Peter Czypek
bib info
-
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
, 390-407,
François-Xavier Standaert
,
Stéphanie Kerckhof
,
François Durvaux
,
Cédric Hocquet
,
David Bol
bib info
-
Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation
, 408-425,
Shiho Moriai
,
Seiichi Matsuda
bib info
-
Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA
, 463-475,
Michael Vielhaber
bib info
-
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
, 476-493,
Subhamoy Maitra
,
Santanu Sarkar
bib info
-
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs
, 494-511,
Debdeep Mukhopadhyay
,
Chester Rebeiro
,
Sujoy Sinha Roy
bib info
-
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
, 512-529,
Johannes Buchmann
,
Michael Schneider 0002
,
Norman Göttert
,
Thomas Feller
,
Sorin A. Huss
bib info
-
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
, 530-547,
Vadim Lyubashevsky
,
Tim Güneysu
,
Thomas Pöppelmann
bib info
-
An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor
, 548-564,
Jen-Wei Lee
,
Szu-Chi Chung
,
Hsie-Chia Chang
,
Chen-Yi Lee
bib info