| 2013 | Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers Stefan Mangard |
| 2012 | Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich |
| 2012 | Defensive Leakage Camouflage. Eric Brier, Quentin Fortier, Roman Korkikian, Khalid W. Magld, David Naccache, Guilherme Ozari de Almeida, Adrien Pommellet, A. H. Ragab, Jean Vuillemin |
| 2012 | Dynamic Fault Injection Countermeasure - A New Conception of Java Card Security. Guillaume Barbu, Philippe Andouard, Christophe Giraud |
| 2012 | Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models. François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon |
| 2012 | Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines. Timo Bartkewitz, Kerstin Lemke-Rust |
| 2012 | Improved (and Practical) Public-Key Authentication for UHF RFID Tags. Sébastien Canard, Loïc Ferreira, Matthew Robshaw |
| 2012 | Improving Side-Channel Analysis with Optimal Linear Transforms. David F. Oswald, Christof Paar |
| 2012 | Java Card Combined Attacks with Localization-Agnostic Fault Injection. Julien Lancia |
| 2012 | Low-Cost Countermeasure against RPA. Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache |
| 2012 | Memory Access Pattern Protection for Resource-Constrained Devices. Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake |
| 2012 | Multipurpose Cryptographic Primitive ARMADILLO3. Petr Susil, Serge Vaudenay |
| 2012 | On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices. Tolga Yalçin, Elif Bilge Kavun |
| 2012 | On the Use of Shamir's Secret Sharing against Side-Channel Analysis. Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche |
| 2012 | Putting together What Fits together - GrÆStl. Markus Pelnar, Michael Muehlberghuber, Michael Hutter |
| 2012 | SCA with Magnitude Squared Coherence. Sébastien Tiran, Philippe Maurine |
| 2012 | Secure Multiple SBoxes Implementation with Arithmetically Masked Input. Luk Bettale |
| 2012 | Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis. Johann Heyszl, Dominik Merli, Benedikt Heinz, Fabrizio De Santis, Georg Sigl |
| 2012 | Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection. Michael Lackner, Reinhard Berlach, Johannes Loinig, Reinhold Weiss, Christian Steger |
| 2012 | Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards. Jan Hajny, Lukas Malina |