TY - BOOK AU - Guilley,Sylvain ED - COSADE (Workshop) TI - Constructive side-channel analysis and secure design: 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers T2 - Lecture notes in computer science SN - 9783319646473 AV - QA76.9.A25 C67 2017 U1 - 005.8 23 PY - 2017///] CY - Cham, Switzerland PB - Springer KW - Data encryption (Computer science) KW - Congresses KW - Computer security KW - Chiffrement (Informatique) KW - Congrès KW - Sécurité informatique KW - Coding theory & cryptology KW - bicssc KW - Information architecture KW - Systems analysis & design KW - Discrete mathematics KW - Algorithms & data structures KW - Computers KW - Security KW - General KW - bisacsh KW - Business & Economics KW - Information Management KW - Information Technology KW - Data Processing KW - Systems Architecture KW - Computer architecture KW - fast KW - Computer science KW - Mathematics KW - Management information systems KW - Microprogramming KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - Includes index; Does Coupling Affect the Security of Masked Implementations? / Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen -- Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks : A Case-Study / Kashif Nawaz, Dinal Kamel, François-Xavier Standaert, Denis Flandre -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks / Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht -- Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation / Rei Ueno, Naofumi Homma, Takafumi Aoki -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors / Jeremy Dubeuf, David Hely, Vincent Beroulle -- SafeDRP : Yet Another Way Toward Power-Equalized Designs in FPGA / Maik Ender, Alexander Wild, Amir Moradi -- On the Construction of Side-Channel Attack Resilient S-boxes / Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices / Yoo-Seung Won, Dong-Guk Han -- Side-Channel Analysis of Keymill / Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel -- On the Easiness of Turning Higher-Order Leakages into First-Order / Thorben Moos, Amir Moradi -- Side-Channel Attacks Against the Human Brain : The PIN Code Case Study / Joseph Lange, Clément Massart, André Mouraux, Francois-Xavier Standaert -- Impacts of Technology Trends on Physical Attacks? / Philippe Maurine, Sylvain Guilley -- Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks / Oscar M. Guillen, Michael Gruber, Fabrizio De Santis -- DFA on LS-Designs with a Practical Implementation on SCREAM / Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors / Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki -- Getting the Most Out of Leakage Detection / Santos Merino del Pozo, François-Xavier Standaert -- Mind the Gap : Towards Secure 1st-Order Masking in Software / Kostas Papagiannopoulos, Nikita Veshchikov N2 - This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools UR - https://link.springer.com/10.1007/978-3-319-64647-3 ER -