9. CHES 2007: Vienna, Austria

Differential and Higher Order Attacks

Random Number Generation and Device Identification

Logic Styles: Masking and Routing

Efficient Algorithms for Embedded Processors

Collision Attacks and Fault Analysis

High Speed AES Implementations

Public-Key Cryptography

Implementation Cost of Countermeasures

Security Issues for RF and RFID

Special Purpose Hardware for Cryptanalysis

Side Channel Analysis

Problems and Solutions for Lightweight Devices

maintained by Schloss Dagstuhl LZI at University of Trier