| 2014 | Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers Aurélien Francillon, Pankaj Rohatgi |
| 2013 | A Machine Learning Approach Against a Masked AES. Liran Lerman, Stephane Fernandes Medeiros, Gianluca Bontempi, Olivier Markowitch |
| 2013 | Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations. Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl |
| 2013 | Efficient Template Attacks. Omar Choudary, Markus G. Kuhn |
| 2013 | Efficient and First-Order DPA Resistant Implementations of Keccak. Begül Bilgin, Joan Daemen, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen, Gilles Van Assche |
| 2013 | Evaluation of ASIC Implementation of Physical Random Number Generators Using RS Latches. Hirotaka Kokubo, Dai Yamamoto, Masahiko Takenaka, Kouichi Itoh, Naoya Torii |
| 2013 | Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol. Abdullah Ali Alshehri, Steve A. Schneider |
| 2013 | From New Technologies to New Solutions - Exploiting FRAM Memories to Enhance Physical Security. Stéphanie Kerckhof, François-Xavier Standaert, Eric Peeters |
| 2013 | Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection. Rafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic, Marin Golub |
| 2013 | Low Entropy Masking Schemes, Revisited. Vincent Grosso, François-Xavier Standaert, Emmanuel Prouff |
| 2013 | Manipulating the Frame Information with an Underflow Attack. Emilie Faugeron |
| 2013 | On the Vulnerability of Low Entropy Masking Schemes. Xin Ye, Thomas Eisenbarth |
| 2013 | Optimization of Power Analysis Using Neural Network. Zdenek Martinasek, Jan Hajny, Lukas Malina |
| 2013 | Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks. Guilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine |
| 2013 | Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves. Franck Rondepierre |
| 2013 | The Temperature Side Channel and Heating Fault Attacks. Michael Hutter, Jörn-Marc Schmidt |
| 2013 | Time-Frequency Analysis for Second-Order Attacks. Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul |
| 2013 | Vulnerability Analysis of a Commercial .NET Smart Card. Behrang Fouladi, Konstantinos Markantonakis, Keith Mayes |