{"title":"Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack","authors":"Adrian Thillard, E. Prouff, Thomas Roche","doi":"10.1007/978-3-642-40349-1_2","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_2","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125116671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Differential Fault Attack on MICKEY 2.0","authors":"S. Banik, S. Maitra","doi":"10.1007/978-3-642-40349-1_13","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_13","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132133420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012","authors":"Arnab Roy, S. Vivek","doi":"10.1007/978-3-642-40349-1_24","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_24","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124966155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Accurate Probabilistic Reliability Model for Silicon PUFs","authors":"Roel Maes","doi":"10.1007/978-3-642-40349-1_5","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_5","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124040046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme)","authors":"A. Moradi, Oliver Mischke","doi":"10.1007/978-3-642-40349-1_1","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_1","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133721989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Very High Speed True Random Number Generator with Entropy Assessment","authors":"A. Cherkaoui, V. Fischer, L. Fesquet, A. Aubert","doi":"10.1007/978-3-642-40349-1_11","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_11","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133822745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"McBits: Fast Constant-Time Code-Based Cryptography","authors":"D. Bernstein, T. Chou, P. Schwabe","doi":"10.1007/978-3-642-40349-1_15","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_15","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122496992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices","authors":"Stefan Heyse, Ingo von Maurich, T. Güneysu","doi":"10.1007/978-3-642-40349-1_16","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_16","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127907133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Benoît Gérard, Vincent Grosso, M. Naya-Plasencia, François-Xavier Standaert
{"title":"Block Ciphers That Are Easier to Mask: How Far Can We Go?","authors":"Benoît Gérard, Vincent Grosso, M. Naya-Plasencia, François-Xavier Standaert","doi":"10.1007/978-3-642-40349-1_22","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_22","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132412619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomaz Oliveira, J. C. López-Hernández, Diego F. Aranha, F. Rodríguez-Henríquez
{"title":"Lambda Coordinates for Binary Elliptic Curves","authors":"Thomaz Oliveira, J. C. López-Hernández, Diego F. Aranha, F. Rodríguez-Henríquez","doi":"10.1007/978-3-642-40349-1_18","DOIUrl":"https://doi.org/10.1007/978-3-642-40349-1_18","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127723119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}