|
Talks about Secured Hardware Implementations |
|
| B. Badrignans:
Bistream management in FPGA based secure applications |
|
| J. Bucek, R. Lorencz: Comparing Left-shift and Montgomery inverse implementations in ASIC |
|
| M. Drutarovsky, V. Fischer, G. Lubos, N. Bochard:
Compact AES S-Boxes Initialization in Low Power Non-Volatile FPGAs |
|
| K. Gaj, V. Amirineni, E. Homsirikamol, M. Rogawski, R. Velegalati, M. Varchola: Fair Comparison of Hardware Implementations of Cryptography without Revealing the Source Codes |
|
| M. Rogawski, X. Xin, E. Homsirikamol, D. Hwang, K. Gaj: Implementing SHA1 and SHA2 Standards on the Eve of SHA3 Competition |
|
|
Talks about Side Channel Attacks |
|
| T. Beyrouthy, L. Fesquet:
DPA robust S-BOX implementation on a secure asynchronous FPGA |
|
| L. Bossuet, N. Kamoun, A. Gazel:
A very low cost DPA countermeasures to secure hardware AES cipher |
|
| J-L. Danger:
Evaluation of Countermeasures Implementation Based on Boolean Masking to Thwart Side Channel Attacks |
|
| J. Di-Battista, J.-Ch. Courrege, P. Perdu, B. Rouzeyre, L. Torres:
Light emission analysis on FPGA: a new side channel possibility |
|
| S. Guilley:
Mid-term review of the DPA contest |
|
| W. Schindler:
The Stochastic Approach in Power Analysis - A Synthesis between Engineer's Expertise and Advanced Stochastics |
|
| A. Tisserand:
Redundant Number Systems for Reconfigurable Arithmetic Units |
|
|
Talks about Random Number Generators |
|
| F. Bernard, V. Fischer:
Coherent sampling based TRNG : a statistical and behavioral approach |
|
| |
| R. Newell:
Conditioner and Health Monitor for Use in Conjunction with a Random Bit Generator |
|
| V. Rozic: Random Numbers Generation: Investigation of Physical Effects on FPGA |
|
| R. Santoro: Evaluation of TRNGs under Various Experimental Conditions |
|
| B. Valtchanov, V. Fischer, A. Aubert:
TRNG based on the coherent sampling |
|
| M. Varchola, M. Drutarovsky:
New FPGA based TRNG Principle Using Transition Effect with Built-In Malfunction Detection |
|