SPRINGER
LNCS

sponsored by


GOLDEN SPONSORS

ANSSI

Secure-IC

Riscure




SILVER SPONSORS


Cryptography research

INVIA

SERMA





TWITTER

Accepted Papers

A note on the use of margins to compare distinguishers Oscar Reparaz, Benedikt Gierlichs and Ingrid Verbauwhede (KU Leuven)

Generic DPA attacks: curse or blessing? Oscar Reparaz, Benedikt Gierlichs and Ingrid Verbauwhede (KU Leuven)

Addition with Blinded Operands Mohamed Karroumi, Benjamin Richard and Marc Joye (Technicolor)

On the Optimal Pre-processing for Non-Profiling Differential Power Analysis Suvadeep Hajra and Debdeep Mukhopadhyay (IIT Kharagpur, India)

Studying Leakages on an Embedded Biometric System Using Side Channel Analysis Maël Berthier (Morpho), Yves Bocktaels (Morpho), Julien Bringer (Morpho), Hervé Chabanne (Morpho), Taoufik Chouta (Telecom ParisTECH), Jean-Luc Danger (Telecom ParisTECH, CNRS/LTCI; Secure-IC S.A.S.), Mélanie Favre (Morpho), Tarik Graba (Telecom ParisTECH)

Collision-Correlation Attack against a First-Order Masking Scheme for MAC based on SHA-3 Luk Bettale (Oberthur Technologies), Emmanuelle Dottax (Oberthur Technologies), Laurie Genelle (Oberthur Technologies) and Gilles Piret (Oberthur Technologies)

Attacking Randomized Exponentiations Using Unsupervised Learning Guilherme Perin (LIRMM Montpellier), Laurent Imbert (LIRMM Montpellier), Lionel Torres (LIRMM Montpellier) and Philippe Maurine (LIRMM Montpellier)

Template Attacks on Different Devices Omar Choudary and Markus Kuhn (University of Cambridge)

Adjusting laser injections for fully controlled faults Franck Courbon (Gemalto and ENSMSE), Philippe Loubet-Moundi (Gemalto), Jacques Fournier (CEA Tech Reg/DPACA), Assia Tria (CEA Tech Reg/DPACA)

Common Points or How to Fool ECC Parameters Checking Alberto Battistello (Oberthur Technologies)

On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance Christophe Giraud (Oberthur Technologies)

Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis Yanis Linge (CEA-LETI MINATEC, UJF-Grenoble 1, CNRS, UPMF, TIMC-IMAG), Cécile Dumas (CEA-LETI MINATEC), Sophie Lambert-Lacroix (UJF-Grenoble 1, CNRS, UPMF, TIMC-IMAG)

Verifying Software Integrity in Embedded Systems: A Side Channel Approach Mehari Msgna (Royal Holloway, University of London), Konstantinos Markantonakis (ISG-Smart Card Centre, Founded by Vodafone, G&D and the Information Security Group of Royal Holloway, University of London), David Naccache (Ecole Normale Supérieure) and Keith Mayes (ISG-Smart Card Centre, Founded by Vodafone, G&D and the Information Security Group of Royal Holloway, University of London)

Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES Valentina Banciu and Elisabeth Oswald (University of Bristol)

ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research Colin O'Flynn (Dalhousie University, Canada) and Zhizhang David Chen ( Dalhousie University, Canada)

On Adaptive Bandwidth Selection for Efficient MIA Mathieu Carbone (STmicroelectronics), Philippe Maurine (LIRMM/CEA), Gilles Ducharme (Institut de Mathématiques et de Modélisation de Montpellier), Yannick Teglia (STmicroelectronics), Michel Agoyan (STmicroelectronics), Sébastien Tiran (LIRMM) and Sébastien Ordas (LIRMM)

A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis Annelie Heuser (Télécom ParisTech, CNRS LTCI), Olivier Rioul (Télécom ParisTech, CNRS LTCI) and Sylvain Guilley (Télécom ParisTech, CNRS LTCI, Secure-IC)

A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box Conditions and a Countermeasure Sho Endo (Tohoku University), Naofumi Homma (Tohoku University), Yu-Ichi Hayashi (Tohoku University), Junko Takahashi (NTT Secure Platform Laboratories), Hitoshi Fuji (NTT Secure Platform Laboratories) and Takafumi Aoki (Tohoku University)

Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions Ludovic Gustin, François Durvaux, Stéphanie Kerckhof, François-Xavier Standaert and Michel Verleysen (UCL)

On the Security of RSM - Presenting 5 First- and Second-order Attacks Sebastian Kutzner and Axel Poschmann (Nanyang Technological University)


Organised by
TELECOM-ParisTech

Supported by
Institut MINES-TELECOM CNRS