| 2014 | "Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way. Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom |
| 2014 | A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks. Yossef Oren, Ofir Weisse, Avishai Wool |
| 2014 | A Statistical Model for Higher Order DPA on Masked Devices. A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo |
| 2014 | Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM. Daniel E. Holcomb, Kevin Fu |
| 2014 | Cofactorization on Graphics Processing Units. Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra |
| 2014 | Compact Ring-LWE Cryptoprocessor. Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede |
| 2014 | Constructing S-boxes for Lightweight Cryptography with Feistel Structure. Yongqiang Li, Mingsheng Wang |
| 2014 | Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings Lejla Batina, Matthew Robshaw |
| 2014 | Curve41417: Karatsuba Revisited. Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange |
| 2014 | Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault Attacks. Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay |
| 2014 | EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor. Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki |
| 2014 | Early Propagation and Imbalanced Routing, How to Diminish in FPGAs. Amir Moradi, Vincent Immler |
| 2014 | Efficient Pairings and ECC for Embedded Systems. Thomas Unterluggauer, Erich Wenger |
| 2014 | Efficient Power and Timing Side Channels for Physical Unclonable Functions. Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Mehrdad Majzoobi, Farinaz Koushanfar, Wayne P. Burleson |
| 2014 | Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG. Viktor Fischer, David Lubicz |
| 2014 | Enhanced Lattice-Based Signatures on Reconfigurable Hardware. Thomas Pöppelmann, Léo Ducas, Tim Güneysu |
| 2014 | Entropy Evaluation for Oscillator-Based True Random Number Generators. Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing |
| 2014 | FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison. Khoongming Khoo, Thomas Peyrin, Axel York Poschmann, Huihui Yap |
| 2014 | FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks. Hai Brenner, Lubos Gaspar, Gaëtan Leurent, Alon Rosen, François-Xavier Standaert |
| 2014 | Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek |
| 2014 | Gate-Level Masking under a Path-Based Leakage Metric. Andrew J. Leiserson, Mark E. Marson, Megan A. Wachs |
| 2014 | Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. Daniel Genkin, Itamar Pipman, Eran Tromer |
| 2014 | Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory. Annelie Heuser, Olivier Rioul, Sylvain Guilley |
| 2014 | How to Estimate the Success Rate of Higher-Order Side-Channel Attacks. Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard |
| 2014 | ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption. Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wójcik |
| 2014 | Making RSA-PSS Provably Secure against Non-random Faults. Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz |
| 2014 | Physical Characterization of Arbiter PUFs. Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich |
| 2014 | RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. Noboru Kunihiro, Junya Honda |
| 2014 | Reversing Stealthy Dopant-Level Circuits. Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino |
| 2014 | Secure Conversion between Boolean and Arithmetic Masking of Any Order. Jean-Sébastien Coron, Johann Großschädl, Praveen Kumar Vadnala |
| 2014 | Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede |
| 2014 | Side-Channel Attack against RSA Key Generation Algorithms. Aurélie Bauer, Éliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche |
| 2014 | Side-Channel Leakage through Static Power - Should We Care about in Practice? Amir Moradi |
| 2014 | Simple Power Analysis on AES Key Expansion Revisited. Christophe Clavier, Damien Marion, Antoine Wurcker |