NanoCMOS Molecular Realization of Rijndael Massoud Masoumi, Farshid Raissi and Mahmoud Ahmadian (K. N. Toosi University of Technology, Tehran)
A Proposition for Correlation Power Analysis enhancement Thanh-Ha Le, Jessy Cledi`ere, Cecile Canovas (CEA/LETI), Christine Serviere, Jean-Louis Lacoume (INPG/LIS) and Bruno Robisson (CEA/LETI)
Three-phase Dual-rail Pre-charge Logic Marco Bucci (Infineon Technologies AG), Luca Giancane (University of Rome La Sapienza), Raimondo Luzzi (Infineon Technologies AG) and Alessandro Trifiletti (University of Rome La Sapienza)
Superscalar Coprocessor for High-speed Curve-based Cryptography Kazuo Sakiyama, Lejla Batina, Bart Preneel and Ingrid Verbauwhede (Katholieke Universiteit Leuven)
Dual-Rail Random Switching Logic: A Countermeasure Free of Output Transition Leakage Zhimin Chen and Yujie Zhou (Shanghai Jiao Tong University)
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching Naofumi Homma and Sei Nagashima and Yuichi Imai and Takafumi Aoki (Tohoku University) and Akashi Satoh (IBM Research, Tokyo Research Laboratory)
Implementing Cryptographic Pairings on Smartcards Michael Scott, Neil Costigan and Wesam Abdulwahab (Dublin City University)
Improving SHA-2 Hardware Implementations Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa and Stamatis Vassiliadis (TUDelft)
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors Stefan Tillich and Johann Groszschaedl (Graz University of Technology)
A Generalized Method of Differential Fault Attack Against AES Cryptosystem Amir Moradi, Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani (Sharif University of Technology, Tehran)
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic
Style Daisuke Suzuki and Minoru Saeki (Mitsubishi Electric Corporation)
HIGHT: A New Block Cipher Suitable for Low-Resource Device Deukjo Hong (CIST), Jaechul Sung (University of Seoul), Seokhie Hong, Jongin Lim, Sangjin Lee (CIST), Bon-Seok Koo (NSRI), Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Jongsung Kim (CIST) and Seongtaek Chee (NRSI)
FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Dimitrov (University of Calgary), K. Jarvinen (Helsinki University of Technology), M.J. Jacobson, Jr , W.F. Chan and Z. Huang (University of Calgary)
Why One Should Also Secure RSA Public Key Elements Eric Brier, Benoit Chevallier-Mames, Mathieu Ciet and Christophe Clavier (Gemalto)
SPA-resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form Toru Akishita, Masanobu Katagi and Izuru Kitamura (Sony Corporation)
Read-Proof Hardware from Protective Coatings Pim Tuyls, Geert-Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh and Rob Wolters (Philips Research Laboratories)
Towards Security Limits of Side-Channel Attacks Francois-Xavier Standaert, Eric Peeters (Universite Catholique de Louvain), Cedric Archambeau (University of Southampton) and Jean-Jacques Quisquater (Universite Catholique de Louvain)
Provably Secure S-Box Implementation Based on Fourier Transform Sebastien Aumonier, Christophe Giraud and Emmanuel Prouff (Oberthur Card Systems)
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations Stefan Mangard (Graz University of Technology) and Kai Schramm (Ruhr University Bochum)
Templates vs. Stochastic Methods Benedikt Gierlichs (Katholieke Universiteit Leuven and Ruhr University Bochum), Kerstin Lemke-Rust and Christof Paar (Ruhr University Bochum)
Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker Sandeep Kumar, Christof Paar, Jan Pelzl (Ruhr University Bochum), Gerd Pfeiffer and Manfred Schimmler (Christian-Albrechts-University of Kiel)
Hardware/Software Co-Design of Elliptic Curve Cryptography on an 8051 Microcontroller Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Groszschaedl, Alexander Szekely, Stefan Tillich and Johannes Wolkerstorfer (Graz University of Technology)
Fast Generation of Prime Numbers on Portable Devices: An Update Marc Joye and Pascal Paillier (Gemalto)
Path Swapping Method to Improve DPA resistance of Quasi Delay Insensitive Asynchronous circuits F. Bouesse, G. Sicard and M. Renaudin (TIMA Laboratory)
Optically Enhanced Area-Locked Power Analysis Sergei Skorobogatov (University of Cambridge Computer Laboratory)
Power Attack on Small RSA Public Exponent Pierre-Alain Fouque (ENS), Sebastien Kunz-Jacques (DCSSI), Gwenaelle Martinet (DCSSI), Frederic Muller (HSBC) and Frederic Valette (DGA/CELAR)
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks Konrad Kulikowski, Alexander Smirnov and Alexander Taubin (Boston University)
Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin and Ramakrishna Bachimanchi (George Mason University)
Offline Hardware/Software Authentication for Reconfigurable Platforms Eric Simpson and Patrick Schaumont (Virginia Tech)
Unified Point Addition Formulae and Side-Channel Attacks Douglas Stebila and Nicolas Theriault (University of Waterloo)
Cache-Collision Timing Attacks Against AES Joseph Bonneau (Stanford University) and Ilya Mironov (Microsoft Research)
Template Attacks in Principal Subspaces C. Archambeau (University of Southampton), E. Peeters, F.-X. Standaert and J.-J. Quisquater (Universite Catholique de Louvain)
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors Stefan Tillich and Johann Groszschaedl (Graz University of Technology)
A Generalized Method of Differential Fault Attack Against AES Cryptosystem Amir Moradi, Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani (Sharif University of Technology, Tehran)
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logics Daisuke Suzuki and Minoru Saeki (Mitsubishi Electric Corporation)
HIGHT: A New Block Cipher Suitable for Low-Resource Device Deukjo Hong (CIST), Jaechul Sung (University of Seoul), Seokhie Hong, Jongin Lim, Sangjin Lee (CIST), Bon-Seok Koo (NSRI), Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Jongsung Kim (CIST) and Seongtaek Chee (NRSI)
FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integer Expansions W.F. Chan, V.S. Dimitrov, Z. Huang, M.J. Jacobson Jr. (University of Calgary), and K. Javinen (Helsinki University of Technology)
Why One Should Also Secure RSA Public Key Elements Eric Brier, Benoit Chevallier-Mames, Mathieu Ciet and Christophe Clavier (Gemalto)
SPA-resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form Toru Akishita, Masanobu Katagi and Izuru Kitamura (Sony Corporation)
Read-Proof Hardware from Protective Coatings Pim Tuyls, Geert-Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh and Rob Wolters (Philips Research Laboratories)
Towards Security Limits of Side-Channel Attacks Francois-Xavier Standaert, Eric Peeters (Universite Catholique de Louvain), Cedric Archambeau (University of Southampton) and Jean-Jacques Quisquater (Universite Catholique de Louvain)
Provably Secure S-Box Implementation Based on Fourier Transform Sebastien Aumonier, Christophe Giraud and Emmanuel Prouff (Oberthur Card Systems)
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations Stefan Mangard (Graz University of Technology) and Kai Schramm (Ruhr University Bochum)
Templates vs. Stochastic Methods Benedikt Gierlichs (Katholieke Universiteit Leuven and Ruhr University Bochum), Kerstin Lemke and Christof Paar (Ruhr University Bochum)
Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker Sandeep Kumar, Christof Paar, Jan Pelzl (Ruhr University Bochum), Gerd Pfeiffer and Manfred Schimmler (Christian-Albrechts-University of Kiel)
Hardware/Software Co-Design of Elliptic Curve Cryptography on an 8051 Microcontroller Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Groszschaedl, Alexander Szekely, Stefan Tillich and Johannes Wolkerstorfer (Graz University of Technology)
Fast Generation of Prime Numbers on Portable Devices: An Update Marc Joye and Pascal Paillier (Gemalto)
Path Swapping Method to Improve DPA resistance of Quasi Delay Insensitive Asynchronous Circuits F. Bouesse, G. Sicard and M. Renaudin (TIMA Laboratory)
Optically Enhanced Area-Locked Power Analysis Sergei Skorobogatov (University of Cambridge)
Power Attack on Small RSA Public Exponent Pierre-Alain Fouque (ENS), Sebastien Kunz-Jacques (DCSSI), Gwenaelle Martinet (DCSSI), Frederic Muller (HSBC) and Frederic Valette (DGA/CELAR)
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks Konrad Kulikowski, Alexander Smirnov and Alexander Taubin (Boston University)
Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin and Ramakrishna Bachimanchi (George Mason University)
Offline HW/SW Authentication for Reconfigurable Platforms Eric Simpson and Patrick Schaumont (Virginia Tech)
Unified Point Addition Formulae and Side-Channel Attacks Douglas Stebila and Nicolas Theriault (University of Waterloo)
Cache-Collision Timing Attacks against AES Joseph Bonneau (Stanford University) and Ilya Mironov (Microsoft Research)
Template Attacks in Principal Subspaces C. Archambeau (University of Southampton), E. Peeters, F.-X. Standaert and J.-J. Quisquater (Universite Catholique de Louvain)