List of Accepted Papers

Proceedings are available at Springer Lecture Notes in Computer Science (LNCS).

  • Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations (paper) (slides)

    Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis and Georg Sigl

  • Formal Security Analysis and Improvement of a hash-based NFC M-coupon Protocol (paper) (slides)

    Ali Alshehri and Steve Schneider

  • Efficient template attacks (paper) (slides)

    Omar Choudary and Markus Kuhn

  • Evaluation of ASIC Implementation of Physical Random Number Generators using RS Latches (paper) (slides)

    Hirotaka Kokubo, Dai Yamamoto, Masahiko Takenaka, Kouichi Itoh and Naoya Torii

  • A machine learning approach against a masked AES (paper) (slides)

    Liran Lerman, Stephane Fernandes Medeiros, Gianluca Bontempi and Olivier Markowitch

  • Low Entropy Masking Schemes, Revisited (renamed from Leakage Squeezing, Revisited) (paper) (slides)

    Vincent Grosso, Francois-Xavier Standaert and Emmanuel Prouff

  • From New Technologies to New Solutions (Exploiting FRAM Memories to Enhance Physical Security) (paper) (slides)

    Stéphanie Kerckhof, Francois-Xavier Standaert and Eric Peeters

  • Manipulate frame information with an Underflow attack undetected by the Off-Card Verifier (paper) (slides)

    Emilie Faugeron

  • Efficient and First-Order DPA Resistant Implementations of KECCAK (paper) (slides)

    Begül Bilgin, Svetla Nikova, Vincent Rijmen, Ventzislav Nikov, Joan Daemen and Gilles Van Assche

  • Optimization of Power Analysis Using Neural Network (paper) (slides)

    Zdenek Martinasek, Jan Hajny and Lukas Malina

  • Time-Frequency Analysis for Second-Order Attacks (paper) (slides)

    Pierre Belgarric, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul and Shivam Bhasin

  • Glitch it if you can: Novel parameter search strategies for successful fault injection (paper) (slides)

    Rafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic and Marin Golub

  • The Temperature Side Channel and Heating Fault Attacks (paper) (slides)

    Michael Hutter and Jörn-Marc Schmidt

  • Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves (paper) (slides)

    Franck Rondepierre

  • Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks (paper) (slides)

    Guilherme Perin, Laurent Imbert, Lionel Torres and Philippe Maurine

  • On the Vulnerability of Low Entropy Masking Schemes (paper) (slides)

    Xin Ye and Thomas Eisenbarth




Local organization by - Security in Telecommunications/Technische Universität Berlin.
Header picture by Roman Lashkin, CC BY 2.0.
SIM card and passport picture used with permission by Deutsche Telekom AG.
All pages © 2013, CARDIS 2013 Organization Committee.