M. Joye, D. Naccache, and .. , and Stéphanie Porte Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension, p.13

B. Chevallier-mames, J. Coron, N. Mccullagh-borders, and .. , David Naccache, and Michael Scott Side Channel Analysis Side-Channel Leakage across, p.36

J. Schmidt, T. Plos, M. Kirschbaum, and M. Hutter, Marcel Medwed, and Christoph Herbst Designing a Side Channel Resistant Random Number Generator, p.49

J. Courrège, Benoit Feix, andMyì ene Roussellet Atomicity Improvement for Elliptic Curve Scalar Multiplication, p.80

R. Naeem and A. , Konstantinos Markantonakis, and Keith Mayes Logical Attacks Combined Attacks and Countermeasures, p.133

E. Vetillard and A. Ferrari, Table of Contents Attacks on Java Card 3.0 Combining Fault and Logical Attacks, p.148

G. Barbu, H. Thiebeauld, and .. , and Vincent Guerin Fault Analysis Improved Fault Analysis of Signature Schemes, p.164

C. Giraud, E. W. , and .. , Knudsen, and Michael Tunstall When Clocks Fail: On Critical Paths and Clock Faults, p.182

M. Agoyan, J. Dutertre, D. Naccache, and .. , Bruno Robisson, and Assia Tria Privacy Modeling Privacy for Off-Line RFID Systems

D. Flavio, P. Garcia, and .. Van-rossum-pairings, Developing Efficient Blinded Attribute Certificates on Smart Cards via, p.209

L. Batina, J. Hoepman, and B. Jacobs, Wojciech Mostowski, and Pim Vullers On the Design and Implementation of an Efficient DAA Scheme, p.223