| 2015 | A Masked Ring-LWE Implementation. Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede |
| 2015 | A Physical Approach for Stochastic Modeling of TERO-Based TRNG. Patrick Haddad, Viktor Fischer, Florent Bernard, Jean Nicolai |
| 2015 | Accelerating Homomorphic Evaluation on Reconfigurable Hardware. Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrián Macías |
| 2015 | Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware. Yarkin Doröz, Erdinç Öztürk, Erkay Savas, Berk Sunar |
| 2015 | Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads? Amir Moradi, Alexander Wild |
| 2015 | Blind Source Separation from Single Measurements Using Singular Spectrum Analysis. Santos Merino Del Pozo, François-Xavier Standaert |
| 2015 | Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings Tim Güneysu, Helena Handschuh |
| 2015 | DPA, Bitslicing and Masking at 1 GHz. Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede |
| 2015 | Efficient Ring-LWE Encryption on 8-Bit AVR Processors. Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede |
| 2015 | End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol. Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung |
| 2015 | Evaluation and Improvement of Generic-Emulating DPA Attacks. Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu |
| 2015 | Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA. Werner Schindler |
| 2015 | Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast. Christian Kison, Jürgen Frinken, Christof Paar |
| 2015 | Highly Efficient GF(2 Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki |
| 2015 | Improved Cryptanalysis of the DECT Standard Cipher. Iwen Coisel, Ignacio Sánchez |
| 2015 | Improved Side-Channel Analysis of Finite-Field Multiplication. Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff |
| 2015 | Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability. Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay |
| 2015 | Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations. Tobias Schneider, Amir Moradi |
| 2015 | Less is More - Dimensionality Reduction from a Theoretical Perspective. Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul |
| 2015 | Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates. Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede |
| 2015 | Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation. Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede |
| 2015 | Multi-variate High-Order Attacks of Shuffled Tables Recomputation. Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia |
| 2015 | NaCl's Crypto_box in Hardware. Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser |
| 2015 | Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits. Aurélie Bauer, Damien Vergnaud |
| 2015 | Predictive Models for Min-entropy Estimation. John Kelsey, Kerry A. McKay, Meltem Sönmez Turan |
| 2015 | Robust Profiling for DPA-Style Attacks. Carolyn Whitnall, Elisabeth Oswald |
| 2015 | Secure Key Generation from Biased PUFs. Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems |
| 2015 | Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC. Karim Bigou, Arnaud Tisserand |
| 2015 | SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip. Jake Longo, Elke De Mulder, Dan Page, Michael Tunstall |
| 2015 | Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer |
| 2015 | The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs. Georg T. Becker |
| 2015 | The Simeck Family of Lightweight Block Ciphers. Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong |
| 2015 | Transient-Steady Effect Attack on Block Ciphers. Yanting Ren, An Wang, Liji Wu |
| 2015 | TriviA: A Fast and Secure Authenticated Encryption Scheme. Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi |
| 2015 | Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms. Sarani Bhattacharya, Debdeep Mukhopadhyay |