List of accepted posters (the main contact for each author list is emphasized).
- Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography
Pablo Rauzy, Martin Moreau, Sylvain Guilley, Zakaria Najm (Télécom ParisTech) - Fault Tolerant Infective Countermeasure for AES
Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur) - Evaluation of the Embedded Software Robustness Against Intentional Fault Injections by Simulation
Maël Berthier (SAFRAN Morpho), Cécile Dumas (CEA-Leti), Louis Dureuil (CEA-Leti, VERIMAG), Thanh-Ha Le (SAFRAN Morpho), Marie-Laure Potet (VERIMAG), Lionel Rivière (SAFRAN Morpho) - Runtime Code Polymorphism as a Protection against Physical Attacks
Damien Couroussé (CEA), Thierno Barry (CEA), Bruno Robisson (CEA), Philippe Jaillon (ENSMSE), Jean-Louis Lanet (INRIA Rennes), Olivier Potin (ENSMSE) - Design and Characterization of Cryptohardware for ASIC-embedded Secure Applications to Prevent Power Analysis Attacks
Erica Tena-Sánchez, Antonio J. Acosta (University of Sevilla) - Low power implementation of Trivium stream cipher
J.M. Mora Gutiérrez, C.J. Jiménez Fernández, E. Potestad, M. Valencia Barrero (University of Sevilla) - Evariste III: A new multi-FPGA system for fair benchmarking of hardware dependent cryptographic primitives
Nathalie Bochard, Cédric Marchand, Oto Peťura, Lilian Bossuet, Viktor Fischer (University of Lyon at Saint-Etienne) - Reconfigurable secure hardware co-processor for wireless sensor network nodes
Sadiel de la Fé, Carles Ferrer (Universitat Autònoma de Barcelona) - Building Confidence in the Use of a Quantum Random Number Generator Through an AIS 31 Evaluation
Mathilde Soucarros, Jean-Benoît Page, Damien Stucki (ID Quantique) - A Leakage Resilient MAC
Daniel Martin, Elisabeth Oswald, Martijn Stam, Marcin Wójcik (University of Bristol) - Compiler-based Countermeasure Against Fault Attacks
Thierno Barry (CEA, Ecole Nationale Supérieure des Mines de Saint-Etienne), Damien Couroussé (CEA), Bruno Robisson (Ecole Nationale Supérieure des Mines de Saint-Etienne) - Fault Analysis on Branch Predictors through Hardware Performance Counters
Sarani Bhattacharya, Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur) - Hardware implementation of some ECB-Mix-ECB based algorithms
Cuauhtemoc Mancillas López, Lilian Bossuet (University of Lyon at Saint Etienne) - Consolidating masking schemes
Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven) - The GRACE Code: A Novel Error Correcting Code for System-on-Chip Designs
Michael Höberl, Naeim Safari (Technikon) - HardBlare: an efficient hardware-assisted DIFC for non-modified embedded processors
Pascal Cotret (CentraleSupélec), Guillaume Hiet (CentraleSupélec), Guy Gogniat (University of South Brittany) - Applications security in manycore platform, from operating system to hypervisor: how to build a chain of trust
Clément Dévigne (University Paris 6), Jean-Baptiste Bréjon (University Paris 6), Quentin Meunier (University Paris 6), Franck Wajsbürt (University Paris 6), Maria Mendez Real (University of South Brittany), Vincent Migliore (University of South Brittany), Vianney Lapotre (University of South Brittany), Guy Gogniat (University of South Brittany), Mehdi Aichouch (CEA), Moha Ait Hmid (CEA), Cuauhtemoc Mancillas López (University of Lyon at Saint Etienne), Lilian Bossuet (University of Lyon at Saint Etienne), Viktor Fischer (University of Lyon at Saint Etienne) - Enumerating Keys Accurately and Efficiently
Jonathan F. O’Connell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam (University of Bristol) - Exploration of the best polynomial multiplication algorithm for homomorphic encryption schemes
Vincent Migliore (University of South Brittany), Maria Méndez Real (University of South Brittany), Vianney Lapotre (University of South Brittany), Guy Gogniat (University of South Brittany), Arnaud Tisserand (University Rennes 1), Caroline Fontaine (Institut Mines-Telecom Telecom Bretagne) - A novel quality metric for a memory-based PUF key extraction framework
Sandra Lisa Lattacher, Martin Deutschmann (Technikon) - Fully Homomorphic Encrypted URISC Processor Design
Ayantika Chatterjee, Indranil Sengupta (Indian Institute of Technology Kharagpur) - A Second-order Threshold Implementation of the AES S-box
Thomas De Cnudde, Begül Bilgin, Oscar Reparaz, Ventzislav Nikov, Svetla Nikova (KU Leuven)