17. CHES 2015: Saint-Malo, France

Processing Techniques in Side-Channel Analysis

Cryptographic Hardware Implementations

Homomorphic Encryption in Hardware

Side-Channel Attacks on Public Key Cryptography

Cipher Design and Cryptanalysis

True Random Number Generators and Entropy Estimations

Side-Channel Analysis and Fault Injection Attacks

Higher-Order Side-Channel Attacks

Physically Unclonable Functions and Hardware Trojans

Side-Channel Attacks in Practice

Lattice-Based Implementations