M. Agoyan, B. Robisson, P. Bazargan-Sabet, G. Phan, S. Le Henaff | Smart On Smart: An innovative secured system architecture concept |
F. Arnault, T. Berger, C. Lauradoux, M. Minier, B. Pousse | New LFSRs and FCSRs representations for stream ciphers hardware and software design |
S. Chaumette | The relationship between hardware design and software level security in highly dynamic mobile ad hoc networks |
J. Crenne, R. Tessier, P. Cotret, G. Gogniat, J. P. Diguet | Securing External Shared Memory in Multi-FPGA Context |
F. Devic, L. Torres, B. Badrignans | Secure protocol implementation for remote bitstream update preventing replay attacks on FPGA |
J. Di Battista, B. Rouzeyre, L. Torres, J. C. Courrege | Side-Channel improvement by laser stimulation |
M. Dichtl and B. Meyer | Using Higher Harmonics of Ring Oscillators for Physical Random Number Generation on FPGAs |
G. Di Natale, M. L. Flottes, B. Rouzeyre, M. Valka | Waveforms re-alignment to improve DPA attacks |
M. Drutarovsky and M. Varchola | Analysis of Randomness Sources in Transition Effect Ring Oscillator based TRNG |
J. Francq et C. Thuillet | High-Speed Implementation of the SHA-3 Candidate Shabal |
K. Gaj, J. P. Kaps, V. Amirineni, M. Rogawski, E. Homsirikamol, B. Y. Brewster, J. Pham, and M. Varchola | ATHENa - Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware using FPGAs |
L. Gaspar, V. Fischer | Cryptographic processor with secured key management |
J. Hlavac, M. Hadacek, R. Lorencz | Generating true random bits on general-purpose microcontrollers |
A. Idrissa, A. Aubert, T. Fournel, V. Fischer | Secure Protocols for Serverless Remote Product Authentication |
C. Lauradoux, M. Minier, T. Risset, W. Znaidi | Why should we find new universal hash functions with good hardware implementation ? |
D. Lubicz | On the security of oscillator-based random number generators |
H. Maghrebi, J. L. Danger and S. Guilley | Leakage Squeezing Countermeasure Against High Order Attacks |
M. Nassar, Y. Souissi, S. Guilley and J. L. Danger | The "Rank Correction" Technique to Improve Side-Channel Attacks |
P. Nguyen, H. Triqui | Pinpointing the leakage of dual-rail logics in FPGAs |
M. Rogawski, E. Homsirikamol and K. Gaj | SHA-3 Competition in Hardware - Methodology, Tools, and Results of Comparing Fourteen Round 2 SHA-3 Candidates using Reconfigurable Hardware |
W. Schindler, M. Kasper, M. Stottinger | The Stochastic Approach in Power Analysis - An Efficient Attack and Useful Tool for Target-Oriented Design |