This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They we
Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers
β Scribed by FranΓ§ois-Xavier Standaert, Elisabeth Oswald (eds.)
- Publisher
- Springer International Publishing
- Year
- 2016
- Tongue
- English
- Leaves
- 222
- Series
- Lecture Notes in Computer Science 9689
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016.
The 12 papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named: security and physical attacks; side-channel analysis (case studies); fault analysis; and side-channel analysis (tools).
β¦ Table of Contents
Front Matter....Pages I-X
Front Matter....Pages 1-1
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption....Pages 3-18
Co-location Detection on the Cloud....Pages 19-34
Simple Photonic Emission Attack with Reduced Data Complexity....Pages 35-51
Front Matter....Pages 53-53
Power Analysis Attacks Against IEEE 802.15.4 Nodes....Pages 55-70
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series....Pages 71-87
Dismantling Real-World ECC with Horizontal and Vertical Template Attacks....Pages 88-108
Front Matter....Pages 109-109
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT....Pages 111-129
Improved Differential Fault Analysis on Camellia-128....Pages 130-143
A Note on the Security of CHES 2014 Symmetric Infective Countermeasure....Pages 144-159
Front Matter....Pages 161-161
Simpler, Faster, and More Robust T-Test Based Leakage Detection....Pages 163-183
Design and Implementation of a Waveform-Matching Based Triggering System....Pages 184-198
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order....Pages 199-217
Back Matter....Pages 219-219
β¦ Subjects
Data Encryption;Systems and Data Security;Management of Computing and Information Systems;Algorithm Analysis and Problem Complexity;Discrete Mathematics in Computer Science;Computer Hardware
π SIMILAR VOLUMES
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop, COSADE 2015, held in Berlin, Germany, in April 2015. The 17 revised full papers presented were carefully selected from 48 submissions. the focus of this workshop was on following topics: s
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing
<p><p>This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly exi
<p><span>This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, held in Lugano, Switzerland, in April 2020. </span></p><p><span>Due to COVID-19, the workshop was held online. </span></p><span> The 15 pa
<p><p>This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019. </p><p>The 14 papers presented together with one keynote and one invited talk in this volume were