Accepted Papers
- Kernel Discriminant Analysis for Information Extraction in the Presence of Masking
- Defeating Embedded Cryptographic Protocols by combining Second-Order with Brute Force
- Side-Channel Analysis of the TUAK Algorithm used for Authentication and Key Agreement in 3G/4G Networks
- Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy
- SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
- Concealing Secrets in Embedded Processors Designs
- The Hell Forgery, Self Modifying Codes Shoot again
- Logical Attacks on Secured Containers of the Java Card Platform
- Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations
- A Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves
- Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages
- Squeezing Polynomial Masking in Tower Fields
- PRNGs for Masking Applications and Their Mapping to Evolvable Hardware
- Automated Detection of Instruction Cache Leaks in RSA Software Implementations
- An Analysis of the Learning Parity with Noise Assumptions Against Fault Attacks
Important Dates
| 15 Jan. 2017 | Final version |
News
| Mar. 2017 | Proceedings are freely available online (for 4 weeks) on springer.com |
| 04 Oct. 2016 | Final program is online. |
| 03 Oct. 2016 | Early-bird deadline has been extended to Oct. 5th. |
| 02 Oct. 2016 | List of accepted papers is online. |
| 27 Sept. 2016 | Call for Participation is online. |
| 15 Sept. 2016 | Preliminary program is online. |
| 16 Aug. 2016 | Registration is now open. |
| 12 Aug. 2016 | LightCrypto will be collocated with CARDIS the 09-10th of November. |
| 02 May 2016 | Website is online. |
Organised by:
Tweets by CardisConf







