𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers

✍ Scribed by Emmanuel Prouff (eds.)


Publisher
Springer International Publishing
Year
2014
Tongue
English
Leaves
323
Series
Lecture Notes in Computer Science 8622 Security and Cryptology
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

✦ Table of Contents


Front Matter....Pages I-X
A Note on the Use of Margins to Compare Distinguishers....Pages 1-8
A Theoretical Study of Kolmogorov-Smirnov Distinguishers....Pages 9-28
Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES....Pages 29-40
Addition with Blinded Operands....Pages 41-55
On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance....Pages 56-68
Common Points on Elliptic Curves: The Achilles’ Heel of Fault Attack Countermeasures....Pages 69-81
On Adaptive Bandwidth Selection for Efficient MIA....Pages 82-97
Generic DPA Attacks: Curse or Blessing?....Pages 98-111
Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions....Pages 112-128
Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3....Pages 129-143
Attacking Randomized Exponentiations Using Unsupervised Learning....Pages 144-160
On the Optimal Pre-processing for Non-profiling Differential Power Analysis....Pages 161-178
Template Attacks on Different Devices....Pages 179-198
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis....Pages 199-213
A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure....Pages 214-228
Adjusting Laser Injections for Fully Controlled Faults....Pages 229-242
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research....Pages 243-260
Verifying Software Integrity in Embedded Systems: A Side Channel Approach....Pages 261-280
Studying Leakages on an Embedded Biometric System Using Side Channel Analysis....Pages 281-298
On the Security of RSM - Presenting 5 First- and Second-Order Attacks....Pages 299-312
Back Matter....Pages 313-313

✦ Subjects


Computer Communication Networks; Data Encryption; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Systems and Data Security; Computers and Society


πŸ“œ SIMILAR VOLUMES


Constructive Side-Channel Analysis and S
✍ Guilley, Sylvain πŸ“‚ Library πŸ“… 2017 πŸ› Springer International Publishing 🌐 English

This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They we

Constructive Side-Channel Analysis and S
✍ Juliane KrΓ€mer, Dmitry Nedospasov (auth.), Emmanuel Prouff (eds.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly exi

Constructive Side-Channel Analysis and S
✍ Stefan Mangard, Axel Y. Poschmann (eds.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer International Publishing 🌐 English

<p>This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop, COSADE 2015, held in Berlin, Germany, in April 2015. The 17 revised full papers presented were carefully selected from 48 submissions. the focus of this workshop was on following topics: s

Constructive Side-Channel Analysis and S
✍ FranΓ§ois-Xavier Standaert, Elisabeth Oswald (eds.) πŸ“‚ Library πŸ“… 2016 πŸ› Springer International Publishing 🌐 English

<p><p>This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. <br> The 12 papers presented in this volume were carefully reviewed and selected from 32 submissions. Th

Constructive Side-Channel Analysis and S
✍ Ilia Polian, Marc StΓΆttinger πŸ“‚ Library πŸ“… 2019 πŸ› Springer International Publishing 🌐 English

<p><p>This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019. </p><p>The 14 papers presented together with one keynote and one invited talk in this volume were

Constructive Side-Channel Analysis and S
✍ Guido Marco Bertoni (editor), Francesco Regazzoni (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p><span>This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, held in Lugano, Switzerland, in April 2020. </span></p><p><span>Due to COVID-19, the workshop was held online. </span></p><span> The 15 pa