number | title/author |
---|---|
14P2-A1 | Efficient Method for Estimating Propagation Area of Information Leakage via EM Field Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, |
14P2-A2 | Analysis on Equivalent Current Source of AES-128 Circuit for HD Power Model Verification Kengo Iokibe, Kazuhiro Maeshima, Tetsushi Watanabe, Hiroto Kagotani, Yasuyuki Nogami, Yoshitaka Toyota, |
14P2-A3 | Correlation Power Analysis using Bit-Level Biased Activity Plaintexts against AES Cores with Countermeasures Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yuichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, Jean-Luc Danger, |
14P2-A4 | NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, |
14P2-A5 | Chosen-message Electromagnetic Analysis against Cryptographic Software on Embedded OS Hajime Uno, Sho Endo, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, |
14P2-A6 | Malicious Wave: a Survey on Actively Tampering Using Electromagnetic Glitch Shivam Bhasin, Paolo Maistri, Francesco Regazzoni, |