This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing
Constructive Side-Channel Analysis and Secure Design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers
✍ Scribed by Guilley, Sylvain
- Publisher
- Springer International Publishing
- Year
- 2017
- Tongue
- English
- Leaves
- 309
- Series
- Lecture Notes in Computer Science 10348
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Read more...
Abstract: This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools
✦ Table of Contents
Front Matter ....Pages I-X
Does Coupling Affect the Security of Masked Implementations? (Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen)....Pages 1-18
Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study (Kashif Nawaz, Dinal Kamel, François-Xavier Standaert, Denis Flandre)....Pages 19-33
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks (Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht)....Pages 34-49
Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation (Rei Ueno, Naofumi Homma, Takafumi Aoki)....Pages 50-64
Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors (Jeremy Dubeuf, David Hely, Vincent Beroulle)....Pages 65-82
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA (Maik Ender, Alexander Wild, Amir Moradi)....Pages 83-101
On the Construction of Side-Channel Attack Resilient S-boxes (Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch)....Pages 102-119
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices (Yoo-Seung Won, Dong-Guk Han)....Pages 120-137
Side-Channel Analysis of Keymill (Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel)....Pages 138-152
On the Easiness of Turning Higher-Order Leakages into First-Order (Thorben Moos, Amir Moradi)....Pages 153-170
Side-Channel Attacks Against the Human Brain: The PIN Code Case Study (Joseph Lange, Clément Massart, André Mouraux, Francois-Xavier Standaert)....Pages 171-189
Impacts of Technology Trends on Physical Attacks? (Philippe Maurine, Sylvain Guilley)....Pages 190-206
Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks (Oscar M. Guillen, Michael Gruber, Fabrizio De Santis)....Pages 207-222
DFA on LS-Designs with a Practical Implementation on SCREAM (Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey)....Pages 223-247
Getting the Most Out of Leakage Detection (Santos Merino del Pozo, François-Xavier Standaert)....Pages 264-281
Mind the Gap: Towards Secure 1st-Order Masking in Software (Kostas Papagiannopoulos, Nikita Veshchikov)....Pages 282-297
Back Matter ....Pages 299-299
✦ Subjects
Computer science;Informatique;Microprogramming;Microprogrammation;Architecture, Computer;Computer security;Sécurité informatique;Data encryption (Computer science);Chiffrement (Informatique);Computer science -- Mathematics;Informatique -- Mathématiques;Management information systems;Systèmes d'information de gestion;Computer architecture;Data encryption (Computer science)
📜 SIMILAR VOLUMES
<p><p>This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly exi
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop, COSADE 2015, held in Berlin, Germany, in April 2015. The 17 revised full papers presented were carefully selected from 48 submissions. the focus of this workshop was on following topics: s
<p><p>This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. <br> The 12 papers presented in this volume were carefully reviewed and selected from 32 submissions. Th
<p><span>This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, held in Lugano, Switzerland, in April 2020. </span></p><p><span>Due to COVID-19, the workshop was held online. </span></p><span> The 15 pa
<p><p>This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019. </p><p>The 14 papers presented together with one keynote and one invited talk in this volume were