| 2012 | 3D Hardware Canaries. Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf |
| 2012 | A Differential Fault Attack on the Grain Family of Stream Ciphers. Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar |
| 2012 | A Statistical Model for DPA with Novel Algorithmic Confusion Analysis. Yunsi Fei, Qiasi Luo, A. Adam Ding |
| 2012 | Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model. Yossef Oren, Mathieu Renauld, François-Xavier Standaert, Avishai Wool |
| 2012 | An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor. Jen-Wei Lee, Szu-Chi Chung, Hsie-Chia Chang, Chen-Yi Lee |
| 2012 | Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication. Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz |
| 2012 | Breakthrough Silicon Scanning Discovers Backdoor in Military Chip. Sergei Skorobogatov, Christopher Woods |
| 2012 | Compiler Assisted Masking. Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall |
| 2012 | Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings Emmanuel Prouff, Patrick Schaumont |
| 2012 | Efficient Implementations of MQPKS on Constrained Devices. Peter Czypek, Stefan Heyse, Enrico Thomae |
| 2012 | Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking. Blandine Debraize |
| 2012 | How Far Should Theory Be from Practice? - Evaluation of a Countermeasure. Amir Moradi, Oliver Mischke |
| 2012 | Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation. Seiichi Matsuda, Shiho Moriai |
| 2012 | Low-Latency Encryption - Is "Lightweight = Light + Wait"? Miroslav Knezevic, Ventzislav Nikov, Peter Rombouts |
| 2012 | NEON Crypto. Daniel J. Bernstein, Peter Schwabe |
| 2012 | On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes. Norman Göttert, Thomas Feller, Michael Schneider, Johannes Buchmann, Sorin A. Huss |
| 2012 | PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator. Roel Maes, Anthony Van Herrewege, Ingrid Verbauwhede |
| 2012 | PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. Stefan Katzenbeisser, Ünal Koçabas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann |
| 2012 | Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems. Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann |
| 2012 | Practical Leakage-Resilient Symmetric Cryptography. Sebastian Faust, Krzysztof Pietrzak, Joachim Schipper |
| 2012 | Practical Security Analysis of PUF-Based Two-Player Protocols. Ulrich Rührmair, Marten van Dijk |
| 2012 | Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs. Chester Rebeiro, Sujoy Sinha Roy, Debdeep Mukhopadhyay |
| 2012 | Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA. Michael Vielhaber |
| 2012 | Selecting Time Samples for Multivariate DPA Attacks. Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede |
| 2012 | Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents. Santanu Sarkar, Subhamoy Maitra |
| 2012 | Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us. Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert |
| 2012 | Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment. Vincent van der Leest, Bart Preneel, Erik van der Sluis |
| 2012 | Solving Quadratic Equations with XL on Parallel Architectures. Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang |
| 2012 | Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes. Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz |
| 2012 | Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint. Stéphanie Kerckhof, François Durvaux, Cédric Hocquet, David Bol, François-Xavier Standaert |
| 2012 | Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware. Stefan Heyse, Tim Güneysu |
| 2012 | Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs. Marcel Medwed, François-Xavier Standaert, Antoine Joux |
| 2012 | Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting. Benoît Gérard, François-Xavier Standaert |