Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Constructive Side-Channel Analysis and Secure Design -

Constructive Side-Channel Analysis and Secure Design

8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers

Sylvain Guilley (Herausgeber)

Buch | Softcover
X, 299 Seiten
2017 | 1st ed. 2017
Springer International Publishing (Verlag)
978-3-319-64646-6 (ISBN)
CHF 74,85 inkl. MwSt
This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017.
The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools.

Does Coupling Affect the Security of Masked Implementations.- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study.- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA.- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation.- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors.- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA.- On the Construction of Side-Channel Attack Resilient S-boxes.- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices.- Side-Channel Analysis of Keymill.- On the Easiness of Turning Higher-Order Leakages into First-Order.- Side-Channel Attacks against the Human Brain: The PIN Code Case Study.- Impacts of Technology Trends on Physical Attacks.- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go.- DFA on LS-Designs with a Practical Implementation on SCREAM.- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors.- Getting the Most out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand.- Mind the Gap: Towards Secure 1st-Order Masking in Software.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo X, 299 p. 127 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 480 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte Applications • Computer Architecture • Computer Science • Computer Security • conference proceedings • cryptography • Data Security • Embedded Systems • hardware attacks and countermeasures • Informatics • Informatik • malicious design modifications • Network Security • Penetration Testing • Research • security in hardware • side-channel attack • systems and data security • Systems Security • tamper-proof and tamper-resistant designs
ISBN-10 3-319-64646-X / 331964646X
ISBN-13 978-3-319-64646-6 / 9783319646466
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95