SPRINGER
LNCS

sponsored by:


GOLD SPONSORS

ANSSI

ANSSI

NewAE Technology Inc.

Riscure

Secure-IC





SILVER SPONSORS

INVIA

Accepted Papers

Side-Channel Analysis of Keymill
Christoph Dobraunig, Maria Eichlseder, Thomas Korak and Florian Mendel

On the Easiness of Turning Higher-Order Leakages into First-Order
Thorben Moos and Amir Moradi

Does Coupling Affect the Security of Masked Implementations?
Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzi Nikov, Svetla Nikova and Vincent Rijmen

Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors
Manami Suzuki, Rei Ueno, Naofumi Homma and Takafumi Aoki

Toward More Efficient Tamper-Resistant AES Hardware Architecture Based on Threshold Implementation
Rei Ueno, Naofumi Homma and Takafumi Aoki

Enhanced Elliptic Curve Scalar Multiplication Against Side Channel and Safe Error
Jeremy Dubeuf, David Hely and Vincent Beroulle

Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: a Case-Study
Kashif Nawaz, Dina Kamel, Francois-Xavier Standaert and Denis Flandre

Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA
Florian Unterstein, Johann Heyszl, Fabrizio De Santis and Robert Specht

Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go?
Oscar Guillen, Michael Gruber and Fabrizio De Santis

Yet Another Way Toward Power-Equalized Design in FPGAs
Maik Ender, Alexander Wild and Amir Moradi

DFA on LS-Designs with a Practical Implementation on SCREAM
Benjamin Lac, Anne Canteaut, Jacques Fournier and Renaud Sirdey

Getting the Most Out of Leakage Detection - Statistical tools and measurement setups hand in hand
Santos Merino Del Pozo and Francois-Xavier Standaert

Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices
Yoo Seung Won and Dong-Guk Han

Side-Channel Attacks Against the Human Brain: the PIN Code Case Study
Joseph Lange, Clément Massart, André Mouraux and Francois-Xavier Standaert

On the Construction of Side-Channel Attack Resilient S-boxes
Liran Lerman, Nikita Veshchikov, Stjepan Picek and Olivier Markowitch

Mind the Gap: Towards Secure 1st-order Masking in Software
Kostas Papagiannopoulos and Nikita Veshchikov


Organised by
Télécom ParisTech