26:56 Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionles...
20:50 The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Eva...
23:04 Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channe...
19:46 Static Power SCA of Sub-100 nm CMOS ASICs and the Insecurity of Masking Schemes in Low-Noise En...
18:00 Return of the Hidden Number Problem. A Widespread and Novel Key Extraction Attack on ECDSA and ...
21:04 Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Counter...
22:15 SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Bey...
16:45 Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-B...
35:12 Computer aided Verification and Software Synthesis for Secure Multi Party Computation Protocols 0818