Accepted Posters

List of accepted posters (the main contact for each author list is emphasized).
  1. Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography
    Pablo Rauzy, Martin Moreau, Sylvain Guilley, Zakaria Najm (Télécom ParisTech)
  2. Fault Tolerant Infective Countermeasure for AES
    Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur)
  3. Evaluation of the Embedded Software Robustness Against Intentional Fault Injections by Simulation
    Maël Berthier (SAFRAN Morpho), Cécile Dumas (CEA-Leti), Louis Dureuil (CEA-Leti, VERIMAG), Thanh-Ha Le (SAFRAN Morpho), Marie-Laure Potet (VERIMAG), Lionel Rivière (SAFRAN Morpho)
  4. Runtime Code Polymorphism as a Protection against Physical Attacks
    Damien Couroussé (CEA), Thierno Barry (CEA), Bruno Robisson (CEA), Philippe Jaillon (ENSMSE), Jean-Louis Lanet (INRIA Rennes), Olivier Potin (ENSMSE)
  5. Design and Characterization of Cryptohardware for ASIC-embedded Secure Applications to Prevent Power Analysis Attacks
    Erica Tena-Sánchez, Antonio J. Acosta (University of Sevilla)
  6. Low power implementation of Trivium stream cipher
    J.M. Mora Gutiérrez, C.J. Jiménez Fernández, E. Potestad, M. Valencia Barrero (University of Sevilla)
  7. Evariste III: A new multi-FPGA system for fair benchmarking of hardware dependent cryptographic primitives
    Nathalie Bochard, Cédric Marchand, Oto Peťura, Lilian Bossuet, Viktor Fischer (University of Lyon at Saint-Etienne)
  8. Reconfigurable secure hardware co-processor for wireless sensor network nodes
    Sadiel de la Fé, Carles Ferrer (Universitat Autònoma de Barcelona)
  9. Building Confidence in the Use of a Quantum Random Number Generator Through an AIS 31 Evaluation
    Mathilde Soucarros, Jean-Benoît Page, Damien Stucki (ID Quantique)
  10. A Leakage Resilient MAC
    Daniel Martin, Elisabeth Oswald, Martijn Stam, Marcin Wójcik (University of Bristol)
  11. Compiler-based Countermeasure Against Fault Attacks
    Thierno Barry (CEA, Ecole Nationale Supérieure des Mines de Saint-Etienne), Damien Couroussé (CEA), Bruno Robisson (Ecole Nationale Supérieure des Mines de Saint-Etienne)
  12. Fault Analysis on Branch Predictors through Hardware Performance Counters
    Sarani Bhattacharya, Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur)
  13. Hardware implementation of some ECB-Mix-ECB based algorithms
    Cuauhtemoc Mancillas López, Lilian Bossuet (University of Lyon at Saint Etienne)
  14. Consolidating masking schemes
    Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven)
  15. The GRACE Code: A Novel Error Correcting Code for System-on-Chip Designs
    Michael Höberl, Naeim Safari (Technikon)
  16. HardBlare: an efficient hardware-assisted DIFC for non-modified embedded processors
    Pascal Cotret (CentraleSupélec), Guillaume Hiet (CentraleSupélec), Guy Gogniat (University of South Brittany)
  17. Applications security in manycore platform, from operating system to hypervisor: how to build a chain of trust
    Clément Dévigne (University Paris 6), Jean-Baptiste Bréjon (University Paris 6), Quentin Meunier (University Paris 6), Franck Wajsbürt (University Paris 6), Maria Mendez Real (University of South Brittany), Vincent Migliore (University of South Brittany), Vianney Lapotre (University of South Brittany), Guy Gogniat (University of South Brittany), Mehdi Aichouch (CEA), Moha Ait Hmid (CEA), Cuauhtemoc Mancillas López (University of Lyon at Saint Etienne), Lilian Bossuet (University of Lyon at Saint Etienne), Viktor Fischer (University of Lyon at Saint Etienne)
  18. Enumerating Keys Accurately and Efficiently
    Jonathan F. O’Connell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam (University of Bristol)
  19. Exploration of the best polynomial multiplication algorithm for homomorphic encryption schemes
    Vincent Migliore (University of South Brittany), Maria Méndez Real (University of South Brittany), Vianney Lapotre (University of South Brittany), Guy Gogniat (University of South Brittany), Arnaud Tisserand (University Rennes 1), Caroline Fontaine (Institut Mines-Telecom Telecom Bretagne)
  20. A novel quality metric for a memory-based PUF key extraction framework
    Sandra Lisa Lattacher, Martin Deutschmann (Technikon)
  21. Fully Homomorphic Encrypted URISC Processor Design
    Ayantika Chatterjee, Indranil Sengupta (Indian Institute of Technology Kharagpur)
  22. A Second-order Threshold Implementation of the AES S-box
    Thomas De Cnudde, Begül Bilgin, Oscar Reparaz, Ventzislav Nikov, Svetla Nikova (KU Leuven)