| 2009 | A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions. Francesco Regazzoni, Alessandro Cevrero, François-Xavier Standaert, Stéphane Badel, Theo Kluter, Philip Brisk, Yusuf Leblebici, Paolo Ienne |
| 2009 | A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques. Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh |
| 2009 | A New Side-Channel Attack on RSA Prime Generation. Thomas Finke, Max Gebhardt, Werner Schindler |
| 2009 | Accelerating AES with Vector Permute Instructions. Mike Hamburg |
| 2009 | Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon |
| 2009 | An Efficient Method for Random Delay Generation in Embedded Software. Jean-Sébastien Coron, Ilya Kizhvatov |
| 2009 | CDs Have Fingerprints Too. Ghaith Hammouri, Aykutlu Dana, Berk Sunar |
| 2009 | Crypto Engineering: Some History and Some Case Studies. Christof Paar |
| 2009 | Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings Christophe Clavier, Kris Gaj |
| 2009 | Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves. David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwächter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rudolf Mathar |
| 2009 | Differential Cluster Analysis. Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust |
| 2009 | Differential Fault Analysis on DES Middle Rounds. Matthieu Rivain |
| 2009 | Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases. Nicolas Méloni, M. Anwar Hasan |
| 2009 | Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves. Junfeng Fan, Frederik Vercauteren, Ingrid Verbauwhede |
| 2009 | Faster and Timing-Attack Resistant AES-GCM. Emilia Käsper, Peter Schwabe |
| 2009 | Fault Attacks on RSA Signatures with Partially Unknown Messages. Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier |
| 2009 | First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. Emmanuel Prouff, Robert P. McEvoy |
| 2009 | Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers. Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez |
| 2009 | Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. Matthieu Rivain, Emmanuel Prouff, Julien Doget |
| 2009 | KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. Christophe De Cannière, Orr Dunkelman, Miroslav Knezevic |
| 2009 | Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. Martin Hlavác |
| 2009 | Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. Roel Maes, Pim Tuyls, Ingrid Verbauwhede |
| 2009 | MERO: A Statistical Approach for Hardware Trojan Detection. Rajat Subhra Chakraborty, Francis G. Wolff, Somnath Paul, Christos A. Papachristou, Swarup Bhunia |
| 2009 | MicroEliece: McEliece for Embedded Devices. Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, Christof Paar |
| 2009 | Mutual Information Analysis: How, When and Why?. Nicolas Veyrat-Charvillon, François-Xavier Standaert |
| 2009 | On Tamper-Resistance from a Theoretical Viewpoint. Paulo Mateus, Serge Vaudenay |
| 2009 | Physical Unclonable Functions and Secure Processors. Srini Devadas |
| 2009 | Practical Electromagnetic Template Attack on HMAC. Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette |
| 2009 | Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security. Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede |
| 2009 | SSE Implementation of Multivariate PKCs on Modern x86 CPUs. Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang |
| 2009 | The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators. A. Theodore Markettos, Simon W. Moore |
| 2009 | The State-of-the-Art in IC Reverse Engineering. Randy Torrance, Dick James |
| 2009 | Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne P. Burleson |