sponsored by



NewAE Technology Inc.





Cryptography Research

Oberthur Technologies

Accepted Papers

Power Analysis Attacks against IEEE 802.15.4 Node
Colin O'Flynn and Zhizhang Chen

Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger and Sylvain Guilley

Improved Differential Fault Analysis on Camellia-128
Toru Akishita and Noboru Kunihiro

Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Thomas Unterluggauer and Stefan Mangard

A Note on the Security of CHES 2014 Symmetric Infective Countermeasure
Alberto Battistello and Christophe Giraud

Simple Photonic Emission Attack with Reduced Data Complexity
Elad Carmon, Jean-Pierre Seifert and Avishai Wool

Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
Tobias Schneider, Amir Moradi and Tim Güneysu

Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Àgnes Kiss, Juliane Krämer, Pablo Rauzy and Jean-Pierre Seifert

Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Amir Moradi and Tobias Schneider

Design and implementation of a waveform-matching based triggering system
Arthur Beckers, Josep Balasch, Benedikt Gierlichs and Ingrid Verbauwhede

Simpler, Faster, and More Robust T-test Based Leakage Detection
A. Adam Ding, Cong Chen and Thomas Eisenbarth

Co-location detection on the Cloud
Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar

Organised by
IAIK - Institute for Applied Information Processing and Communications