| 2006 | A Generalized Method of Differential Fault Attack Against AES Cryptosystem. Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh |
| 2006 | A Proposition for Correlation Power Analysis Enhancement. Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume |
| 2006 | Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks. Konrad J. Kulikowski, Alexander B. Smirnov, Alexander Taubin |
| 2006 | Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. Sandeep S. Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler |
| 2006 | Cache-Collision Timing Attacks Against AES. Joseph Bonneau, Ilya Mironov |
| 2006 | Challenges for Trusted Computing. Ahmad-Reza Sadeghi |
| 2006 | Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings Louis Goubin, Mitsuru Matsui |
| 2006 | Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage. Zhimin Chen, Yujie Zhou |
| 2006 | FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers. Vassil S. Dimitrov, Kimmo U. Järvinen, Michael J. Jacobson Jr., W. F. Chan, Zhun Huang |
| 2006 | Fast Generation of Prime Numbers on Portable Devices: An Update. Marc Joye, Pascal Paillier |
| 2006 | HIGHT: A New Block Cipher Suitable for Low-Resource Device. Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee |
| 2006 | Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller. Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Großschädl, Alexander Szekely, Stefan Tillich, Johannes Wolkerstorfer |
| 2006 | High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh |
| 2006 | Implementing Cryptographic Pairings on Smartcards. Michael Scott, Neil Costigan, Wesam Abdulwahab |
| 2006 | Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware. Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi |
| 2006 | Improving SHA-2 Hardware Implementations. Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis |
| 2006 | Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. Stefan Tillich, Johann Großschädl |
| 2006 | Integer Factoring Utilizing PC Cluster. Kazumaro Aoki |
| 2006 | NanoCMOS-Molecular Realization of Rijndael. Massoud Masoumi, Farshid Raissi, Mahmoud Ahmadian |
| 2006 | Offline Hardware/Software Authentication for Reconfigurable Platforms. Eric Simpson, Patrick Schaumont |
| 2006 | Optically Enhanced Position-Locked Power Analysis. Sergei P. Skorobogatov |
| 2006 | Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits. G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin |
| 2006 | Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations. Stefan Mangard, Kai Schramm |
| 2006 | Power Attack on Small RSA Public Exponent. Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette |
| 2006 | Provably Secure S-Box Implementation Based on Fourier Transform. Emmanuel Prouff, Christophe Giraud, Sébastien Aumônier |
| 2006 | Read-Proof Hardware from Protective Coatings. Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters |
| 2006 | SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form. Toru Akishita, Masanobu Katagi, Izuru Kitamura |
| 2006 | Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style. Daisuke Suzuki, Minoru Saeki |
| 2006 | Superscalar Coprocessor for High-Speed Curve-Based Cryptography. Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
| 2006 | Template Attacks in Principal Subspaces. Cédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater |
| 2006 | Templates vs. Stochastic Methods. Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar |
| 2006 | The Outer Limits of RFID Security. Ari Juels |
| 2006 | Three-Phase Dual-Rail Pre-charge Logic. Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti |
| 2006 | Towards Security Limits in Side-Channel Attacks. François-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater |
| 2006 | Unified Point Addition Formulæ and Side-Channel Attacks. Douglas Stebila, Nicolas Thériault |
| 2006 | Why One Should Also Secure RSA Public Key Elements. Eric Brier, Benoît Chevallier-Mames, Mathieu Ciet, Christophe Clavier |