Tang An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control, p.69 ,
Arco Affiliation-Hiding Authentication with Minimal Bandwidth Consumption, p.85 ,
and Yannick Teglia XII Table of Contents Hardware Implementation A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines, p.144 ,
Wolkerstorfer An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture, p.160 ,
Stefan Tillich, and Daniel Page A Comparison of Post-Processing Techniques for Biased Random Number Generators, p.175 ,
Khoongming Khoo, and Chik-How Tan Security and Cryptography AES Variants Secure against Related-Key Differential and Boomerang Attacks ,
Matt Henricksen, and Axel Poschmann Leakage Squeezing Countermeasure against High-Order Attacks, p.208 ,
244 Zbigniew Go l ebiewski, Krzysztof Majcher, Filip Zagórski, and Marcin Zawada Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard, p.254 ,
Table of Contents XIII FIRE: Fault Injection for Reverse Engineering, p.280 ,
Maroua Borsali, and Harold Leboulanger A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area, 381 Savvas Mousionis ,