F. Lu, Lab. LIRMM, Montpellier | A multi-level simulation tool for laser attacks |
D. Lubicz, DGA-MI, Bruz | Oscillator based TRNG with a certified entropy rate |
Z. Cherif, TELECOM ParisTech | Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA |
T. Richmond, Lab. Hubert Curien, St-Etienne | A secure implementation of a Goppa decoder |
M. Sepulveda, Lab-STICC, Lorient | 3D security-enhanced communication structure for 3D-MPSoCs protection: challenges and oportunities |
B. Robisson, CEA-Leti, Gardanne | The bad and the good of physical functions |
M. Dichtl, Siemens Corporate Technology, Germany | On ring oscillator based True Random Number Generators and some of their variants |
L. Gaspar, UCL, Belgique | Hardware implementation and side-channel analysis of LAPIN |
S. Bhasin, TELECOM ParisTech | From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications |
W. Schindler, BSI, Germany | When should a side-channel attack or a fault attack be considered as successful? |
A. Heuser, TELECOM ParisTech | Revealing the secrets of success. Theoretical efficiency of side-channel distinguishers |
M. Drutarovsky, Technical University of Kosice, Slovakia | Remotely testable eDiViDe FPGA setup of soft CPU with cryptographic TRNG coprocessor extension |
T. Chouta, TELECOM ParisTech | Enhancement of hill climbing attacks on biometric embedded system using SCA |
J.-P. Kaps, George Mason University, USA | Towards a Flexible, Opensource BOard for Side-channel analysis (FOBOS) |
K. Gaj, George Mason University, USA | An FPGA-based Accelerator for Tate Pairing over Prime Fields |
S. Guilley, TELECOM ParisTech | Masking With Codes |
R. Lorencz, Czech Technical University Prague, Czech Republic | Implementation of DES cryptographic algorithm using NVIDIA GPU for a brute-force attack |
R. Newell, Microsemi Corp., USA | Recent advances in FPGA design security reduce insider threats |
F. Regazzoni, ALaRI, Switzerland | High-Throughput Implementation of AES-Based Lightweight Authenticated Encryption - ALE |
M. Novotny, Czech Technical University Prague, Czech Republic | Differential Power Analysis under Constrained Budget: Low Cost Education of Hackers |
P. Swierczynski, Ruhr-University Bochum, Germany | Security Analysis of the Bitstream Encryption Scheme of Altera FPGAs |
According to the Data Protection Act of January 6th, 1978, you have at any time, a right of access, rectification and opposition to all of your personal data by contacting us (see "contact" page).