:facetid:toc:\"db/conf/cardis/cardis2016.bht\"OK:facetid:toc:db/conf/cardis/cardis2016.bhtKerstin Lemke-RustMichael TunstallSmart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected PapersCARDISLecture Notes in Computer Science10146Springer2017Editorshipconf/cardis/201610.1007/978-3-319-54669-8https://doi.org/10.1007/978-3-319-54669-8https://dblp.org/rec/conf/cardis/2016URL#3036192Francesco BertiFrançois-Xavier StandaertAn Analysis of the Learning Parity with Noise Assumption Against Fault Attacks.CARDIS245-2642016Conference and Workshop Papersclosedconf/cardis/BertiS1610.1007/978-3-319-54669-8_15https://doi.org/10.1007/978-3-319-54669-8_15https://dblp.org/rec/conf/cardis/BertiS16URL#3216693Eleonora CagliCécile DumasEmmanuel ProuffKernel Discriminant Analysis for Information Extraction in the Presence of Masking.CARDIS1-222016Conference and Workshop Papersclosedconf/cardis/CagliDP1610.1007/978-3-319-54669-8_1https://doi.org/10.1007/978-3-319-54669-8_1https://dblp.org/rec/conf/cardis/CagliDP16URL#3216694Cong ChenMehmet Sinan InciMostafa TahaThomas Eisenbarth 0001SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs.CARDIS73-882016Conference and Workshop Papersclosedconf/cardis/ChenITE1610.1007/978-3-319-54669-8_5https://doi.org/10.1007/978-3-319-54669-8_5https://dblp.org/rec/conf/cardis/ChenITE16URL#3216695Franck CourbonSergei SkorobogatovChristopher WoodsReverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy.CARDIS57-722016Conference and Workshop Papersclosedconf/cardis/CourbonSW1610.1007/978-3-319-54669-8_4https://doi.org/10.1007/978-3-319-54669-8_4https://dblp.org/rec/conf/cardis/CourbonSW16URL#3216696Benoit FeixAndjy RicartBenjamin TimonLucille TordellaDefeating Embedded Cryptographic Protocols by Combining Second-Order with Brute Force.CARDIS23-382016Conference and Workshop Papersclosedconf/cardis/FeixRTT1610.1007/978-3-319-54669-8_2https://doi.org/10.1007/978-3-319-54669-8_2https://dblp.org/rec/conf/cardis/FeixRTT16URL#3216697Hannes GroßManuel JelinekStefan MangardThomas UnterluggauerMario WernerConcealing Secrets in Embedded Processors Designs.CARDIS89-1042016Conference and Workshop Papersclosedconf/cardis/GrossJMUW1610.1007/978-3-319-54669-8_6https://doi.org/10.1007/978-3-319-54669-8_6https://dblp.org/rec/conf/cardis/GrossJMUW16URL#3216698Kimmo Järvinen 0001Josep BalaschSingle-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations.CARDIS137-1552016Conference and Workshop Papersclosedconf/cardis/JarvinenB1610.1007/978-3-319-54669-8_9https://doi.org/10.1007/978-3-319-54669-8_9https://dblp.org/rec/conf/cardis/JarvinenB16URL#3216699Houssem MaghrebiJulien BringerSide-Channel Analysis of the TUAK Algorithm Used for Authentication and Key Agreement in 3G/4G Networks.CARDIS39-562016Conference and Workshop Papersclosedconf/cardis/MaghrebiB1610.1007/978-3-319-54669-8_3https://doi.org/10.1007/978-3-319-54669-8_3https://dblp.org/rec/conf/cardis/MaghrebiB16URL#3216700Abdelhak MesbahLeo RegnaudJean-Louis LanetMohamed MezghicheThe Hell Forgery - Self Modifying Codes Shoot Again.CARDIS105-1212016Conference and Workshop Papersclosedconf/cardis/MesbahRLM1610.1007/978-3-319-54669-8_7https://doi.org/10.1007/978-3-319-54669-8_7https://dblp.org/rec/conf/cardis/MesbahRLM16URL#3216701Stjepan PicekBohan Yang 0001Vladimir RozicJo VliegenJori WinderickxThomas De CnuddeNele MentensPRNGs for Masking Applications and Their Mapping to Evolvable Hardware.CARDIS209-2272016Conference and Workshop Papersclosedconf/cardis/Picek0RVWCM1610.1007/978-3-319-54669-8_13https://doi.org/10.1007/978-3-319-54669-8_13https://dblp.org/rec/conf/cardis/Picek0RVWCM16URL#3216702Fabrizio De SantisTobias BauerGeorg SiglSqueezing Polynomial Masking in Tower Fields - A Higher-Order Masked AES S-Box.CARDIS192-2082016Conference and Workshop Papersclosedconf/cardis/SantisBS1610.1007/978-3-319-54669-8_12https://doi.org/10.1007/978-3-319-54669-8_12https://dblp.org/rec/conf/cardis/SantisBS16URL#3216703Ruggero SusellaSofia MontrasioA Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves.CARDIS156-1732016Conference and Workshop Papersclosedconf/cardis/SusellaM1610.1007/978-3-319-54669-8_10https://doi.org/10.1007/978-3-319-54669-8_10https://dblp.org/rec/conf/cardis/SusellaM16URL#3216704Sergei VolokitinErik PollLogical Attacks on Secured Containers of the Java Card Platform.CARDIS122-1362016Conference and Workshop Papersclosedconf/cardis/VolokitinP1610.1007/978-3-319-54669-8_8https://doi.org/10.1007/978-3-319-54669-8_8https://dblp.org/rec/conf/cardis/VolokitinP16URL#3216705Weijia Wang 0003François-Xavier StandaertYu Yu 0001Sihang PuJunrong LiuZheng Guo 0001Dawu GuInner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.CARDIS174-1912016Conference and Workshop Papersclosedconf/cardis/WangSYPLGG1610.1007/978-3-319-54669-8_11https://doi.org/10.1007/978-3-319-54669-8_11https://dblp.org/rec/conf/cardis/WangSYPLGG16URL#3216706Andreas ZanklJohann HeyszlGeorg SiglAutomated Detection of Instruction Cache Leaks in Modular Exponentiation Software.CARDIS228-2442016Conference and Workshop Papersclosedconf/cardis/ZanklHS1610.1007/978-3-319-54669-8_14https://doi.org/10.1007/978-3-319-54669-8_14https://dblp.org/rec/conf/cardis/ZanklHS16URL#3216707