| 2013 | A Differential Fault Attack on MICKEY 2.0. Subhadeep Banik, Subhamoy Maitra |
| 2013 | A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement. Mudit Bhargava, Ken Mai |
| 2013 | A New Model for Error-Tolerant Side-Channel Cube Attacks. Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede |
| 2013 | A Very High Speed True Random Number Generator with Entropy Assessment. Abdelkarim Cherkaoui, Viktor Fischer, Laurent Fesquet, Alain Aubert |
| 2013 | An Accurate Probabilistic Reliability Model for Silicon PUFs. Roel Maes |
| 2013 | Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012. Arnab Roy, Srinivas Vivek |
| 2013 | Block Ciphers That Are Easier to Mask: How Far Can We Go? Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert |
| 2013 | Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings Guido Bertoni, Jean-Sébastien Coron |
| 2013 | Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. Begül Bilgin, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang |
| 2013 | High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition. Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter |
| 2013 | Improving Modular Inversion in RNS Using the Plus-Minus Method. Karim Bigou, Arnaud Tisserand |
| 2013 | Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults. Ronan Lashermes, Jacques J. A. Fournier, Louis Goubin |
| 2013 | Lambda Coordinates for Binary Elliptic Curves. Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez |
| 2013 | Leakage-Resilient Symmetric Encryption via Re-keying. Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque |
| 2013 | Masking vs. Multiparty Computation: How Large Is the Gap for AES? Vincent Grosso, François-Xavier Standaert, Sebastian Faust |
| 2013 | McBits: Fast Constant-Time Code-Based Cryptography. Daniel J. Bernstein, Tung Chou, Peter Schwabe |
| 2013 | Non-invasive Spoofing Attacks for Anti-lock Braking Systems. Yasser Shoukry, Paul D. Martin, Paulo Tabuada, Mani B. Srivastava |
| 2013 | On Measurable Side-Channel Leaks Inside ASIC Design Primitives. Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino |
| 2013 | On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs. Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann |
| 2013 | On the Implementation of Unified Arithmetic on Binary Huff Curves. Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede |
| 2013 | On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme). Amir Moradi, Oliver Mischke |
| 2013 | Profiling DPA: Efficacy and Efficiency Trade-Offs. Carolyn Whitnall, Elisabeth Oswald |
| 2013 | Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID. Peter Pessl, Michael Hutter |
| 2013 | Sleuth: Automated Verification of Software Power Analysis Countermeasures. Ali Galip Bayrak, Francesco Regazzoni, David Novo, Paolo Ienne |
| 2013 | Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices. Stefan Heyse, Ingo von Maurich, Tim Güneysu |
| 2013 | Stealthy Dopant-Level Hardware Trojans. Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson |
| 2013 | Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack. Adrian Thillard, Emmanuel Prouff, Thomas Roche |
| 2013 | Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA. Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson |