Constructive side-channel analysis and secure design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers /: 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers. ([2017])
- Record Type:
- Book
- Title:
- Constructive side-channel analysis and secure design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers /: 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers. ([2017])
- Main Title:
- Constructive side-channel analysis and secure design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers
- Other Titles:
- COSADE 2017
- Further Information:
- Note: Sylvain Guilley (ed.).
- Editors:
- Guilley, Sylvain
- Other Names:
- COSADE (Workshop), 8th
- Contents:
- Does Coupling Affect the Security of Masked Implementations? / Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen -- Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks : A Case-Study / Kashif Nawaz, Dinal Kamel, François-Xavier Standaert, Denis Flandre -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks / Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht -- Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation / Rei Ueno, Naofumi Homma, Takafumi Aoki -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors / Jeremy Dubeuf, David Hely, Vincent Beroulle -- SafeDRP : Yet Another Way Toward Power-Equalized Designs in FPGA / Maik Ender, Alexander Wild, Amir Moradi -- On the Construction of Side-Channel Attack Resilient S-boxes / Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices / Yoo-Seung Won, Dong-Guk Han -- Side-Channel Analysis of Keymill / Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel -- On the Easiness of Turning Higher-Order Leakages into First-Order / Thorben Moos, Amir Moradi -- Side-Channel Attacks Against the Human Brain : The PIN Code Case Study / Joseph Lange, Clément Massart, André Mouraux, Francois-Xavier Standaert -- Impacts of TechnologyDoes Coupling Affect the Security of Masked Implementations? / Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen -- Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks : A Case-Study / Kashif Nawaz, Dinal Kamel, François-Xavier Standaert, Denis Flandre -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks / Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht -- Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation / Rei Ueno, Naofumi Homma, Takafumi Aoki -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors / Jeremy Dubeuf, David Hely, Vincent Beroulle -- SafeDRP : Yet Another Way Toward Power-Equalized Designs in FPGA / Maik Ender, Alexander Wild, Amir Moradi -- On the Construction of Side-Channel Attack Resilient S-boxes / Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices / Yoo-Seung Won, Dong-Guk Han -- Side-Channel Analysis of Keymill / Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel -- On the Easiness of Turning Higher-Order Leakages into First-Order / Thorben Moos, Amir Moradi -- Side-Channel Attacks Against the Human Brain : The PIN Code Case Study / Joseph Lange, Clément Massart, André Mouraux, Francois-Xavier Standaert -- Impacts of Technology Trends on Physical Attacks? / Philippe Maurine, Sylvain Guilley -- Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks / Oscar M. Guillen, Michael Gruber, Fabrizio De Santis -- DFA on LS-Designs with a Practical Implementation on SCREAM / Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors / Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki -- Getting the Most Out of Leakage Detection / Santos Merino del Pozo, François-Xavier Standaert -- Mind the Gap : Towards Secure 1st-Order Masking in Software / Kostas Papagiannopoulos, Nikita Veshchikov. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource, illustrations
- Subjects:
- 005.8
Computer science
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security
Data encryption (Computer science)
Information Systems
Computer network architectures
Computational complexity
Microprogramming
Computer architecture
Computer science
Computer science -- Mathematics
Computer security
Data encryption (Computer science)
Management information systems
Microprogramming
Computers -- Security -- General
Business & Economics -- Information Management
Computers -- Information Technology
Computers -- Data Processing
Computers -- Systems Architecture -- General
Coding theory & cryptology
Information architecture
Systems analysis & design
Discrete mathematics
Algorithms & data structures
Computer security
Computer Science
Systems and Data Security
Data Encryption
Management of Computing and Information Systems
Computer System Implementation
Discrete Mathematics in Computer Science
Control Structures and Microprogramming
Electronic books - Languages:
- English
- ISBNs:
- 9783319646473
3319646478 - Related ISBNs:
- 331964646X
9783319646466 - Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from digital title page (viewed on June 7, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.366054
- Ingest File:
- 02_344.xml