| 2010 | 256 Bit Standardized Crypto for 650 GE - GOST Revisited. Axel Poschmann, San Ling, Huaxiong Wang |
| 2010 | A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over \mathbb Nicolas Guillermin |
| 2010 | ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware. Stéphane Badel, Nilay Dagtekin, Jorge Nakahara Jr., Khaled Ouafi, Nicolas Reffé, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay |
| 2010 | Algebraic Side-Channel Analysis in the Presence of Errors. Yossef Oren, Mario Kirschbaum, Thomas Popp, Avishai Wool |
| 2010 | An Alternative to Error Correction for SRAM-Like PUFs. Maximilian Hofer, Christoph Böhm |
| 2010 | Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. Jean-Sébastien Coron, Ilya Kizhvatov |
| 2010 | Co- Raveen R. Goundar, Marc Joye, Atsuko Miyaji |
| 2010 | Coordinate Blinding over Large Prime Fields. Michael Tunstall, Marc Joye |
| 2010 | Correlation-Enhanced Power Analysis Collision Attack. Amir Moradi, Oliver Mischke, Thomas Eisenbarth |
| 2010 | Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings Stefan Mangard, François-Xavier Standaert |
| 2010 | Developing a Hardware Evaluation Method for SHA-3 Candidates. Luca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, Frank K. Gürkaynak |
| 2010 | Efficient Techniques for High-Speed Elliptic Curve Cryptography. Patrick Longa, Catherine H. Gebotys |
| 2010 | Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs. Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski |
| 2010 | Fast Exhaustive Search for Polynomial Systems in Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang |
| 2010 | Fault Sensitivity Analysis. Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta |
| 2010 | Flash Memory 'Bumping' Attacks. Sergei Skorobogatov |
| 2010 | Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version). Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider |
| 2010 | Mixed Bases for Efficient Inversion in \mathbb Yasuyuki Nogami, Kenta Nekado, Tetsumi Toyota, Naoto Hongo, Yoshitaka Morikawa |
| 2010 | New High Entropy Element for FPGA Based True Random Number Generators. Michal Varchola, Milos Drutarovský |
| 2010 | New Results on Instruction Cache Attacks. Onur Aciiçmez, Billy Bob Brumley, Philipp Grabher |
| 2010 | PRINTcipher: A Block Cipher for IC-Printing. Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw |
| 2010 | Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures. Joppe W. Bos, Deian Stefan |
| 2010 | Provably Secure Higher-Order Masking of AES. Matthieu Rivain, Emmanuel Prouff |
| 2010 | Public Key Perturbation of Randomized RSA Implementations. Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin |
| 2010 | Quark: A Lightweight Hash. Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia |
| 2010 | Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection. Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia |
| 2010 | Side-Channel Analysis of Six SHA-3 Candidates. Olivier Benoît, Thomas Peyrin |
| 2010 | Sponge-Based Pseudo-Random Number Generators. Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche |
| 2010 | The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes. Daisuke Suzuki, Koichi Shimizu |
| 2010 | When Failure Analysis Meets Side-Channel Attacks. Jerome Di-Battista, Jean-Christophe Courrège, Bruno Rouzeyre, Lionel Torres, Philippe Perdu |
| 2010 | XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework. Christian Wenzel-Benner, Jens Gräf |