and Stéphanie Porte Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension, p.13 ,
David Naccache, and Michael Scott Side Channel Analysis Side-Channel Leakage across, p.36 ,
Marcel Medwed, and Christoph Herbst Designing a Side Channel Resistant Random Number Generator, p.49 ,
Benoit Feix, andMyì ene Roussellet Atomicity Improvement for Elliptic Curve Scalar Multiplication, p.80 ,
Konstantinos Markantonakis, and Keith Mayes Logical Attacks Combined Attacks and Countermeasures, p.133 ,
Table of Contents Attacks on Java Card 3.0 Combining Fault and Logical Attacks, p.148 ,
and Vincent Guerin Fault Analysis Improved Fault Analysis of Signature Schemes, p.164 ,
Knudsen, and Michael Tunstall When Clocks Fail: On Critical Paths and Clock Faults, p.182 ,
Bruno Robisson, and Assia Tria Privacy Modeling Privacy for Off-Line RFID Systems ,
Developing Efficient Blinded Attribute Certificates on Smart Cards via, p.209 ,
Wojciech Mostowski, and Pim Vullers On the Design and Implementation of an Efficient DAA Scheme, p.223 ,