System-on-a-Chip Security.- In-situ Extraction of Randomness from Computer Architecture through Hardware Performance Counters.- Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Latency and Low-Energy Applications.- Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance.- Post-Quantum Cryptography.- Improving Speed of Dilithium's Signing Procedure.- An efficient and provable masked implementation of qtesla.- Side-Channel Analysis.- Side-channel attacks on blinded scalar multiplications revisited.- Remote Side-Channel Attacks on Heterogeneous SoC.- Optimal Collision Side-Channel Attacks.- Microarchitectural Attacks.- A Bit-Level Approach to Side Channel Based Disassembling.- CCCiCC: A Cross-core Cache-independent Covert Channel on AMD Family 15h CPUs.- Design Considerations for EM Pulse Fault Injection.- Cryptographic Primitives.- Lightweight MACs from Universal Hash Functions.- FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms.- Advances in Side-Channel Analysis.- A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis.- Key Enumeration from the Adversarial Viewpoint. When to Stop Measuring and Start Enumerating?.