12th Smart Card Research and Advanced Application Conference November 27-29, 2013 Berlin, Germany |
Proceedings are available at Springer Lecture Notes in Computer Science (LNCS).
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations (paper) (slides)
Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis and Georg Sigl
Formal Security Analysis and Improvement of a hash-based NFC M-coupon Protocol (paper) (slides)
Ali Alshehri and Steve Schneider
Efficient template attacks (paper) (slides)
Omar Choudary and Markus Kuhn
Evaluation of ASIC Implementation of Physical Random Number Generators using RS Latches (paper) (slides)
Hirotaka Kokubo, Dai Yamamoto, Masahiko Takenaka, Kouichi Itoh and Naoya Torii
A machine learning approach against a masked AES (paper) (slides)
Liran Lerman, Stephane Fernandes Medeiros, Gianluca Bontempi and Olivier Markowitch
Low Entropy Masking Schemes, Revisited (renamed from Leakage Squeezing, Revisited) (paper) (slides)
Vincent Grosso, Francois-Xavier Standaert and Emmanuel Prouff
From New Technologies to New Solutions (Exploiting FRAM Memories to Enhance Physical Security) (paper) (slides)
Stéphanie Kerckhof, Francois-Xavier Standaert and Eric Peeters
Manipulate frame information with an Underflow attack undetected by the Off-Card Verifier (paper) (slides)
Emilie Faugeron
Efficient and First-Order DPA Resistant Implementations of KECCAK (paper) (slides)
Begül Bilgin, Svetla Nikova, Vincent Rijmen, Ventzislav Nikov, Joan Daemen and Gilles Van Assche
Optimization of Power Analysis Using Neural Network (paper) (slides)
Zdenek Martinasek, Jan Hajny and Lukas Malina
Time-Frequency Analysis for Second-Order Attacks (paper) (slides)
Pierre Belgarric, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul and Shivam Bhasin
Glitch it if you can: Novel parameter search strategies for successful fault injection (paper) (slides)
Rafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic and Marin Golub
The Temperature Side Channel and Heating Fault Attacks (paper) (slides)
Michael Hutter and Jörn-Marc Schmidt
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves (paper) (slides)
Franck Rondepierre
Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks (paper) (slides)
Guilherme Perin, Laurent Imbert, Lionel Torres and Philippe Maurine
On the Vulnerability of Low Entropy Masking Schemes (paper) (slides)
Xin Ye and Thomas Eisenbarth