Constructive side-channel analysis and secure design : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised selected papers /: 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised selected papers. (2015)
- Record Type:
- Book
- Title:
- Constructive side-channel analysis and secure design : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised selected papers /: 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised selected papers. (2015)
- Main Title:
- Constructive side-channel analysis and secure design : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised selected papers
- Other Titles:
- COSADE 2015
- Further Information:
- Note: Stefan Mangard, Axel Y. Poschmann (eds.).
- Editors:
- Mangard, Stefan
Poschmann, Axel Y - Other Names:
- COSADE (Workshop), 6th
- Contents:
- Side-Channel Attacks -- Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements -- Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis) -- Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits -- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks -- Two Operands of Multipliers in Side-Channel Attack -- FPGA Countermeasures -- Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs -- Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware -- Timing Attacks and Countermeasures -- A Faster and More Realistic Flush+Reload Attack on AES -- Faster software for fast endomorphisms -- Toward Secure Implementation of McEliece Decryption -- Fault Attacks -- Fault Injection with a new favor: Memetic Algorithms make a difference -- Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers -- A Biased Fault Attack on the Time Redundancy Countermeasure for AES -- Countermeasures -- Faster Mask Conversion with Lookup Tables -- Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC -- Hands-on Side-Channel Analysis Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs -- Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment.
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2015
- Extent:
- 1 online resource (x, 271 pages), illustrations
- Subjects:
- 005.8/2
Computer science
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security
Data encryption (Computer science)
Computer Science
Engineering & Applied Sciences
Computers -- Hardware -- Network Hardware
Computers -- Security -- General
Business & Economics -- Information Management
Computers -- Programming -- Algorithms
Computers -- Data Processing
Network hardware
Computer security
Information architecture
Algorithms & data structures
Discrete mathematics
Data encryption (Computer science)
Computer Communication Networks
Computer security
Information Systems
Computer software
Computational complexity
Coding theory & cryptology
Electronic books
Conference papers and proceedings
Electronic books - Languages:
- English
- ISBNs:
- 9783319214764
3319214764
3319214756
9783319214757 - Related ISBNs:
- 9783319214757
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed July 23, 2015).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.354794
- Ingest File:
- 01_315.xml