9. CHES 2007: Vienna, Austria

Differential and Higher Order Attacks

Random Number Generation and Device Identification

Logic Styles: Masking and Routing

Efficient Algorithms for Embedded Processors

Collision Attacks and Fault Analysis

High Speed AES Implementations

Public-Key Cryptography

Implementation Cost of Countermeasures

Security Issues for RF and RFID

Special Purpose Hardware for Cryptanalysis

Side Channel Analysis

Problems and Solutions for Lightweight Devices