| 2016 | - vatiCAN - Vetted, Authenticated CAN Bus. Stefan Nürnberger, Christian Rossow |
| 2016 | A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks. Samaneh Ghandali, Georg T. Becker, Daniel E. Holcomb, Christof Paar |
| 2016 | A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki |
| 2016 | Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture. Andrew D. Zonenberg, Bülent Yener |
| 2016 | Cache Attacks Enable Bulk Key Recovery on the Cloud. Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar |
| 2016 | CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. Yuval Yarom, Daniel Genkin, Nadia Heninger |
| 2016 | Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul |
| 2016 | Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings Benedikt Gierlichs, Axel Y. Poschmann |
| 2016 | Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis. Sarani Bhattacharya, Debdeep Mukhopadhyay |
| 2016 | Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough. Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen |
| 2016 | Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications. Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu |
| 2016 | Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering. Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner |
| 2016 | EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. Dhiman Saha, Dipanwita Roy Chowdhury |
| 2016 | Faster Evaluation of SBoxes via Common Shares. Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun |
| 2016 | Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme. Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom |
| 2016 | Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields. Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa |
| 2016 | Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun |
| 2016 | Masking AES with d+1 Shares in Hardware. Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen |
| 2016 | Mitigating SAT Attack on Logic Locking. Yang Xie, Ankur Srivastava |
| 2016 | No Place to Hide: Contactless Probing of Secret Data on FPGAs. Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert |
| 2016 | On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking. Dahmun Goudarzi, Matthieu Rivain |
| 2016 | Physical Layer Group Key Agreement for Automotive Controller Area Networks. Shalabh Jain, Jorge Guajardo |
| 2016 | QcBits: Constant-Time Small-Key Code-Based Cryptography. Tung Chou |
| 2016 | Reducing the Number of Non-linear Multiplications in Masking Schemes. Jürgen Pulkus, Srinivas Vivek |
| 2016 | Run-Time Accessible DRAM PUFs in Commodity Devices. Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer |
| 2016 | Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach. Romain Poussier, François-Xavier Standaert, Vincent Grosso |
| 2016 | Software Implementation of Koblitz Curves over Quadratic Fields. Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez |
| 2016 | Strong 8-bit Sboxes with Efficient Masking in Hardware. Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider |
| 2016 | Strong Machine Learning Attack Against PUFs with No Mathematical Model. Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert |
| 2016 | Towards Easy Leakage Certification. François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo |
| 2016 | \mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers. Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina |