Constructive Approaches for Security Analysis and Design of Embedded Systems
Springer International Publishing (Verlag)
978-3-032-01404-7 (ISBN)
This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2 4, 2025.
The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.
.-Attacks on Symmetric Cryptography.
.- The Dangerous Message/Key Swap in HMAC.
.- Practical Second-Order CPA Attack on Ascon with Proper Selection
Function.
.- Side-Channel Attacks.
.- On the Success Rate of Simple Side-Channel Attacks against Masking
with Unlimited Attack Traces.
.- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.
.- Physical Security.
.- Robust and Reliable PUF Protocol Exploiting Non-Monotonic
Quantization and Neyman-Pearson Lemma.
.- Towards Package Opening Detection at Power-up by Monitoring
Thermal Dissipation.
.- Partial Key Overwrite Attacks in Microcontrollers: a Survey.
.- RISC-V.
.- Combined Masking and Shuffling for Side-Channel Secure Ascon on
RISC-V.
.- A Hardware Design Methodology to Prevent Microarchitectural
Transition Leakages.
.- Machine Learning.
.- Taking AI-Based Side-Channel Attacks to a New Dimension.
.- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for
Deep Learning-based Side-Channel Analysis.
.- Improving Leakage Exploitability in Horizontal Side Channel Attacks
through Anomaly Mitigation with Unsupervised Neural Networks.
.- Profiling Side-Channel Attack on HQC Polynomial Multiplication
Using Machine Learning Methods.
.- Attacks on Post-Quantum Cryptography.
.- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM.
.- A Horizontal Attack on the Codes and Restricted Objects Signature
Scheme (CROSS).
.- Vladimir Sarde and Nicolas Debande.
.- Message-Recovery Horizontal Correlation Attack on Classic McEliece.
.- Breaking HuFu with 0 Leakage: A Side-Channel Analysis.
.- Securing Post-Quantum Cryptography.
.- X2X: Low-Randomness and High-Throughput A2B and B2A
conversions for d+1 shares in Hardware.
.- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum
Digital Signatures and KEMs.
.- Efficient Error Detection Methods for the Number Theoretic Transforms
in Lattice-Based Algorithms.
.- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation.
.- Homomorphic Encryption and White-Box Cryptography.
.- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks.
.- White-Box Implementation Techniques for the HFE Family.
| Erscheinungsdatum | 24.07.2025 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | XI, 604 p. 198 illus., 153 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | authentication • computer crime • Computer Hardware • Computer Networks • Computer Security • Countermeasures • cryptographic implementations • cryptography • Embedded Systems • fault injection attacks • hardware security • homomorphic encryption • Machine Learning Attacks • Physically unclonable functions • post-quantum cryptography • random number generation • RISC-V Architectures • side-channel attacks • white-box cryptography |
| ISBN-10 | 3-032-01404-2 / 3032014042 |
| ISBN-13 | 978-3-032-01404-7 / 9783032014047 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich