C. Chen, C. J. Mitchell, and S. , Tang An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control, p.69

D. Paolo, Arco Affiliation-Hiding Authentication with Minimal Bandwidth Consumption, p.85

A. Barenghi, G. Pelosi, and .. , and Yannick Teglia XII Table of Contents Hardware Implementation A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines, p.144

M. Hutter, M. Feldhofer, and J. , Wolkerstorfer An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture, p.160

S. Hoerder, M. Wójcik, and .. , Stefan Tillich, and Daniel Page A Comparison of Post-Processing Techniques for Biased Random Number Generators, p.175

. Siew-hwee, Y. Kwok, G. Ee, K. Chew, and .. Zheng, Khoongming Khoo, and Chik-How Tan Security and Cryptography AES Variants Secure against Related-Key Differential and Boomerang Attacks

J. Choy, A. Zhang, and K. Khoo, Matt Henricksen, and Axel Poschmann Leakage Squeezing Countermeasure against High-Order Attacks, p.208

R. Lundin, S. Lindskog-practical-attacks-on, H. , H. Protocols, and .. , 244 Zbigniew Go l ebiewski, Krzysztof Majcher, Filip Zagórski, and Marcin Zawada Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard, p.254

J. Hua, K. Sakurai, and .. , Table of Contents XIII FIRE: Fault Injection for Reverse Engineering, p.280

J. Vincent, C. Porquet, and .. , Maroua Borsali, and Harold Leboulanger A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area, 381 Savvas Mousionis