Accepted Papers

  • Evaluation of the Ability to Transform SIM Applications into Hostile Applications

    Authors: Machemie Jean-Baptiste, Lanet Jean-Louis, Bouffard Guillaume, Jean-Yves Poichotte and Jean-Philippe Wary.
    Affiliation: University of Limoges (France) and DISAG - SFR (France).
  • Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0

    Authors: Guillaume Barbu and Hugues Thiebeauld.
    Affiliation: Oberthur, France, and RFI Global Services, UK.
  • Redundant Modular Reduction Algorithms

    Authors: Vincent Dupaquis and Alexandre Venelli.
    Affiliation: Inside Secure, France
  • A Formal Security Model of Smart Card Web Server

    Authors: Quang-Huy Nguyen and Pierre Neron.
    Affiliation: Trusted Labs and Ecole Polytechnique, France
  • Implementation and Evaluation of an SCA-Resistant Embedded Processor

    Authors: Stefan Tillich, Mario Kirschbaum and Alexander Szekely.
    Affiliation: University of Bristol, United Kingdom and Graz University of Technology, Austria
  • Combined Software and Hardware Attacks on the Java Card Control Flow

    Authors: Guillaume Bouffard, Julien Iguchi-Cartigny and Lanet Jean-Louis.
    Affiliation: XLIM Labs, Limoges university, France.
  • Fast Key Recovery Attack on ARMADILLO1 and Variants

    Authors: Pouyan Sepehrdad, Petr Susil and Serge Vaudenay.
    Affilitation: EPFL, Switzerland
  • Differential Fault Analysis of AES-128 Key Schedule using a Single Multi-Byte Fault

    Authors: Sk Subidh Ali and Debdeep Mukhopadhyay.
    Affiliation: Indian Institute of Technology Kharagpur, India
  • Fresh Re-Keying II: Securing Multiple Parties against Side-Channel and Fault Attacks

    Authors: Marcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld and Francois-Xavier Standaert.
    Affiliation: UCL Crypto Group, Université catholique de Louvain, Belgium
  • Memory-Efficient Fault Countermeasures

    Authors: Marc Joye and Mohamed Karroumi.
    Affiliation: Technicolor
  • Evaluating 16-bit Processors for Elliptic Curve Cryptography

    Authors: Erich Wenger and Mario Werner.
    Affiliation: Graz University of Technology, Austria
  • A Hardware Processor Supporting Elliptic Curve Cryptography for Less Than 9kGEs

    Authors: Erich Wenger and Michael Hutter.
    Affiliation: Graz University of Technology, Austria
  • Compact FPGA Implementations of the Five SHA-3 Finalists

    Authors: Stéphanie Kerckhof, François Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Meurice De Dormale and Francois-Xavier Standaert.
    Affiliation: UCL Crypto Group, Université catholique de Louvain and MuElec, Belgium
  • Combined Fault and Side-Channel Attack on Protected Implementations of AES

    Authors: Victor Lomné, Karim Khalfallah and Thomas Roche.
    Affiliation: ANSSI, France
  • Formal Analysis of CWA 14890-1

    Author: Ashar Javed.
    Affiliation: Hamburg University of Technology, Germany
  • An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis

    Authors: Carolyn Whitnall, Elisabeth Oswald and Luke Mather.
    Affiliations (all authors): University of Bristol, UK
  • Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures

    Authors: Guillaume Barbu, Guillaume Duc and Philippe Hoogvorst.
    Affiliation: Oberthur Technologies and Institut Télécom/Télécom ParisTech, France
  • RAM: Rapid Alignment Method

    Authors: Ruben Muijrers, Jasper Van Woudenberg and Lejla Batina.
    Affiliation: Radboud University Nijmegen and Riscure BV, Netherlands, and Katholieke Universiteit Leuven, COSIC, Belgium
  • A High-Performance Implementation of Differential Power Analysis on Graphics Cards

    Authors: Timo Bartkewitz and Kerstin Lemke-Rust.
    Affiliation: Bonn-Rhine-Sieg University of Applied Sciences, Germany
  • Memory Encryption for Smart Cards

    Authors: Baris Ege, Elif Bilge Kavun and Tolga Yalcin.
    Affiliation: IAM, Middle East Technical University and EMSEC, HGI, Ruhr-Universitaet Bochum, Germany