Accepted Papers
Side-Channel Analysis of Keymill
Christoph Dobraunig, Maria Eichlseder, Thomas Korak and Florian Mendel
On the Easiness of Turning Higher-Order Leakages into First-Order
Thorben Moos and Amir Moradi
Does Coupling Affect the Security of Masked Implementations?
Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzi Nikov, Svetla Nikova and Vincent Rijmen
Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors
Manami Suzuki, Rei Ueno, Naofumi Homma and Takafumi Aoki
Toward More Efficient Tamper-Resistant AES Hardware Architecture Based on Threshold Implementation
Rei Ueno, Naofumi Homma and Takafumi Aoki
Enhanced Elliptic Curve Scalar Multiplication Against Side Channel and Safe Error
Jeremy Dubeuf, David Hely and Vincent Beroulle
Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: a Case-Study
Kashif Nawaz, Dina Kamel, Francois-Xavier Standaert and Denis Flandre
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA
Florian Unterstein, Johann Heyszl, Fabrizio De Santis and Robert Specht
Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go?
Oscar Guillen, Michael Gruber and Fabrizio De Santis
Yet Another Way Toward Power-Equalized Design in FPGAs
Maik Ender, Alexander Wild and Amir Moradi
DFA on LS-Designs with a Practical Implementation on SCREAM
Benjamin Lac, Anne Canteaut, Jacques Fournier and Renaud Sirdey
Getting the Most Out of Leakage Detection - Statistical tools and measurement setups hand in hand
Santos Merino Del Pozo and Francois-Xavier Standaert
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices
Yoo Seung Won and Dong-Guk Han
Side-Channel Attacks Against the Human Brain: the PIN Code Case Study
Joseph Lange, Clément Massart, André Mouraux and Francois-Xavier Standaert
On the Construction of Side-Channel Attack Resilient S-boxes
Liran Lerman, Nikita Veshchikov, Stjepan Picek and Olivier Markowitch
Mind the Gap: Towards Secure 1st-order Masking in Software
Kostas Papagiannopoulos and Nikita Veshchikov