Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Constructive Approaches for Security Analysis and Design of Embedded Systems -

Constructive Approaches for Security Analysis and Design of Embedded Systems

First International Conference, CASCADE 2025, Saint-Etienne, France, April 2–4, 2025, Proceedings
Buch | Softcover
XI, 604 Seiten
2025
Springer International Publishing (Verlag)
978-3-032-01404-7 (ISBN)
CHF 109,95 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2 4, 2025.
The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks;  Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.

.-Attacks on Symmetric Cryptography.

.- The Dangerous Message/Key Swap in HMAC.

.- Practical Second-Order CPA Attack on Ascon with Proper Selection
Function.

.- Side-Channel Attacks.

.- On the Success Rate of Simple Side-Channel Attacks against Masking
with Unlimited Attack Traces.

.- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY. 

.- Physical Security.

.- Robust and Reliable PUF Protocol Exploiting Non-Monotonic
Quantization and Neyman-Pearson Lemma.

.- Towards Package Opening Detection at Power-up by Monitoring
Thermal Dissipation.

.- Partial Key Overwrite Attacks in Microcontrollers: a Survey.

.- RISC-V.

.- Combined Masking and Shuffling for Side-Channel Secure Ascon on
RISC-V.

.- A Hardware Design Methodology to Prevent Microarchitectural
Transition Leakages.

.- Machine Learning.

.- Taking AI-Based Side-Channel Attacks to a New Dimension.

.- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for
Deep Learning-based Side-Channel Analysis.

.- Improving Leakage Exploitability in Horizontal Side Channel Attacks
through Anomaly Mitigation with Unsupervised Neural Networks.

.- Profiling Side-Channel Attack on HQC Polynomial Multiplication
Using Machine Learning Methods.

.- Attacks on Post-Quantum Cryptography.

.- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM.

.- A Horizontal Attack on the Codes and Restricted Objects Signature
Scheme (CROSS).

.- Vladimir Sarde and Nicolas Debande.

.- Message-Recovery Horizontal Correlation Attack on Classic McEliece.

.- Breaking HuFu with 0 Leakage: A Side-Channel Analysis.

.- Securing Post-Quantum Cryptography.

.- X2X: Low-Randomness and High-Throughput A2B and B2A
conversions for d+1 shares in Hardware.

.- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum
Digital Signatures and KEMs.

.- Efficient Error Detection Methods for the Number Theoretic Transforms
in Lattice-Based Algorithms.

.- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation.

.- Homomorphic Encryption and White-Box Cryptography.

.- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks.

.- White-Box Implementation Techniques for the HFE Family. 

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XI, 604 p. 198 illus., 153 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Schlagworte authentication • computer crime • Computer Hardware • Computer Networks • Computer Security • Countermeasures • cryptographic implementations • cryptography • Embedded Systems • fault injection attacks • hardware security • homomorphic encryption • Machine Learning Attacks • Physically unclonable functions • post-quantum cryptography • random number generation • RISC-V Architectures • side-channel attacks • white-box cryptography
ISBN-10 3-032-01404-2 / 3032014042
ISBN-13 978-3-032-01404-7 / 9783032014047
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95