| M. Agoyan, B. Robisson, P. Bazargan-Sabet, G. Phan, S. Le Henaff | Smart On Smart: An innovative secured system architecture concept |
| F. Arnault, T. Berger, C. Lauradoux, M. Minier, B. Pousse | New LFSRs and FCSRs representations for stream ciphers hardware and software design |
| S. Chaumette | The relationship between hardware design and software level security in highly dynamic mobile ad hoc networks |
| J. Crenne, R. Tessier, P. Cotret, G. Gogniat, J. P. Diguet | Securing External Shared Memory in Multi-FPGA Context |
| F. Devic, L. Torres, B. Badrignans | Secure protocol implementation for remote bitstream update preventing replay attacks on FPGA |
| J. Di Battista, B. Rouzeyre, L. Torres, J. C. Courrege | Side-Channel improvement by laser stimulation |
| M. Dichtl and B. Meyer | Using Higher Harmonics of Ring Oscillators for Physical Random Number Generation on FPGAs |
| G. Di Natale, M. L. Flottes, B. Rouzeyre, M. Valka | Waveforms re-alignment to improve DPA attacks |
| M. Drutarovsky and M. Varchola | Analysis of Randomness Sources in Transition Effect Ring Oscillator based TRNG |
| J. Francq et C. Thuillet | High-Speed Implementation of the SHA-3 Candidate Shabal |
| K. Gaj, J. P. Kaps, V. Amirineni, M. Rogawski, E. Homsirikamol, B. Y. Brewster, J. Pham, and M. Varchola | ATHENa - Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware using FPGAs |
| L. Gaspar, V. Fischer | Cryptographic processor with secured key management |
| J. Hlavac, M. Hadacek, R. Lorencz | Generating true random bits on general-purpose microcontrollers |
| A. Idrissa, A. Aubert, T. Fournel, V. Fischer | Secure Protocols for Serverless Remote Product Authentication |
| C. Lauradoux, M. Minier, T. Risset, W. Znaidi | Why should we find new universal hash functions with good hardware implementation ? |
| D. Lubicz | On the security of oscillator-based random number generators |
| H. Maghrebi, J. L. Danger and S. Guilley | Leakage Squeezing Countermeasure Against High Order Attacks |
| M. Nassar, Y. Souissi, S. Guilley and J. L. Danger | The "Rank Correction" Technique to Improve Side-Channel Attacks |
| P. Nguyen, H. Triqui | Pinpointing the leakage of dual-rail logics in FPGAs |
| M. Rogawski, E. Homsirikamol and K. Gaj | SHA-3 Competition in Hardware - Methodology, Tools, and Results of Comparing Fourteen Round 2 SHA-3 Candidates using Reconfigurable Hardware |
| W. Schindler, M. Kasper, M. Stottinger | The Stochastic Approach in Power Analysis - An Efficient Attack and Useful Tool for Target-Oriented Design |