Amazon cover image
Image from Amazon.com

Constructive side-channel analysis and secure design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers / Sylvain Guilley (Ed.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 10348. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham, Switzerland : Springer, [2017]Description: 1 online resource : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319646473
  • 3319646478
Other title:
  • COSADE 2017
Subject(s): Genre/Form: Additional physical formats: Print version:: Constructive side-channel analysis and secure designDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 C67 2017
Online resources:
Contents:
Does Coupling Affect the Security of Masked Implementations? / Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen -- Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks : A Case-Study / Kashif Nawaz, Dinal Kamel, François-Xavier Standaert, Denis Flandre -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks / Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht -- Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation / Rei Ueno, Naofumi Homma, Takafumi Aoki -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors / Jeremy Dubeuf, David Hely, Vincent Beroulle -- SafeDRP : Yet Another Way Toward Power-Equalized Designs in FPGA / Maik Ender, Alexander Wild, Amir Moradi -- On the Construction of Side-Channel Attack Resilient S-boxes / Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices / Yoo-Seung Won, Dong-Guk Han -- Side-Channel Analysis of Keymill / Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel -- On the Easiness of Turning Higher-Order Leakages into First-Order / Thorben Moos, Amir Moradi -- Side-Channel Attacks Against the Human Brain : The PIN Code Case Study / Joseph Lange, Clément Massart, André Mouraux, Francois-Xavier Standaert -- Impacts of Technology Trends on Physical Attacks? / Philippe Maurine, Sylvain Guilley -- Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks / Oscar M. Guillen, Michael Gruber, Fabrizio De Santis -- DFA on LS-Designs with a Practical Implementation on SCREAM / Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors / Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki -- Getting the Most Out of Leakage Detection / Santos Merino del Pozo, François-Xavier Standaert -- Mind the Gap : Towards Secure 1st-Order Masking in Software / Kostas Papagiannopoulos, Nikita Veshchikov.
Summary: This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes index.

Does Coupling Affect the Security of Masked Implementations? / Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen -- Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks : A Case-Study / Kashif Nawaz, Dinal Kamel, François-Xavier Standaert, Denis Flandre -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks / Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht -- Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation / Rei Ueno, Naofumi Homma, Takafumi Aoki -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors / Jeremy Dubeuf, David Hely, Vincent Beroulle -- SafeDRP : Yet Another Way Toward Power-Equalized Designs in FPGA / Maik Ender, Alexander Wild, Amir Moradi -- On the Construction of Side-Channel Attack Resilient S-boxes / Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices / Yoo-Seung Won, Dong-Guk Han -- Side-Channel Analysis of Keymill / Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel -- On the Easiness of Turning Higher-Order Leakages into First-Order / Thorben Moos, Amir Moradi -- Side-Channel Attacks Against the Human Brain : The PIN Code Case Study / Joseph Lange, Clément Massart, André Mouraux, Francois-Xavier Standaert -- Impacts of Technology Trends on Physical Attacks? / Philippe Maurine, Sylvain Guilley -- Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks / Oscar M. Guillen, Michael Gruber, Fabrizio De Santis -- DFA on LS-Designs with a Practical Implementation on SCREAM / Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors / Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki -- Getting the Most Out of Leakage Detection / Santos Merino del Pozo, François-Xavier Standaert -- Mind the Gap : Towards Secure 1st-Order Masking in Software / Kostas Papagiannopoulos, Nikita Veshchikov.

This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools.

Online resource; title from digital title page (viewed on July 26, 2019).

Powered by Koha