Constructive Side-Channel Analysis and Secure Design
Springer International Publishing (Verlag)
978-3-319-64646-6 (ISBN)
The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools.
Does Coupling Affect the Security of Masked Implementations.- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study.- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA.- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation.- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors.- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA.- On the Construction of Side-Channel Attack Resilient S-boxes.- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices.- Side-Channel Analysis of Keymill.- On the Easiness of Turning Higher-Order Leakages into First-Order.- Side-Channel Attacks against the Human Brain: The PIN Code Case Study.- Impacts of Technology Trends on Physical Attacks.- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go.- DFA on LS-Designs with a Practical Implementation on SCREAM.- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors.- Getting the Most out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand.- Mind the Gap: Towards Secure 1st-Order Masking in Software.
| Erscheinungsdatum | 22.08.2017 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | X, 299 p. 127 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 480 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Applications • Computer Architecture • Computer Science • Computer Security • conference proceedings • cryptography • Data Security • Embedded Systems • hardware attacks and countermeasures • Informatics • Informatik • malicious design modifications • Network Security • Penetration Testing • Research • security in hardware • side-channel attack • systems and data security • Systems Security • tamper-proof and tamper-resistant designs |
| ISBN-10 | 3-319-64646-X / 331964646X |
| ISBN-13 | 978-3-319-64646-6 / 9783319646466 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich