Towards Sound and Optimal Leakage Detection Procedure
Leakage Bounds for Gaussian Side Channels
An EM Fault Injection Susceptibility Criterion and its Application to the Localization of Hotspots
Connecting and Improving Direct Sum Masking and Inner Product Masking
Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?
A First-Order Chosen Plaintext DPA Attack on the Third Round of DES
A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks
May The Force Be With You: Force-Based Relay Attack Detection
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher
Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices
Optimal First-Order Boolean Masking for Embedded IoT Devices
Instruction Duplication: Leaky and Not Too Fault-Tolerant!
Applying Horizontal Clustering Side-channel Attacks on Embedded ECC Implementations