000 04813nam a22006495i 4500
001 978-3-319-64647-3
003 DE-He213
005 20210120143351.0
007 cr nn 008mamaa
008 170728s2017 gw | s |||| 0|eng d
020 _a9783319646473
_9978-3-319-64647-3
024 7 _a10.1007/978-3-319-64647-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aConstructive Side-Channel Analysis and Secure Design
_h[electronic resource] :
_b8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers /
_cedited by Sylvain Guilley.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aX, 299 p. 127 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology ;
_v10348
_aLecture Notes in Computer Science
_v10348
505 0 _aDoes Coupling Affect the Security of Masked Implementations -- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA -- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors -- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA -- On the Construction of Side-Channel Attack Resilient S-boxes -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices -- Side-Channel Analysis of Keymill -- On the Easiness of Turning Higher-Order Leakages into First-Order -- Side-Channel Attacks against the Human Brain: The PIN Code Case Study -- Impacts of Technology Trends on Physical Attacks -- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go -- DFA on LS-Designs with a Practical Implementation on SCREAM -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors -- Getting the Most out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand -- Mind the Gap: Towards Secure 1st-Order Masking in Software.
520 _aThis book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 0 _aManagement information systems.
650 0 _aComputer science.
650 0 _aArchitecture, Computer.
650 0 _aComputer science—Mathematics.
650 0 _aMicroprogramming .
650 1 4 _aSystems and Data Security.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28060
650 2 4 _aCryptology.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28020
650 2 4 _aManagement of Computing and Information Systems.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I24067
650 2 4 _aComputer System Implementation.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I13057
650 2 4 _aDiscrete Mathematics in Computer Science.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I17028
650 2 4 _aControl Structures and Microprogramming.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I12018
700 1 _aGuilley, Sylvain.
_eeditor.
_0(orcid)0000-0002-5044-3534
_1https://orcid.org/0000-0002-5044-3534
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319646466
776 0 8 _iPrinted edition:
_z9783319646480
830 0 _aSecurity and Cryptology ;
_v10348
830 0 _aLecture Notes in Computer Science ;
_v10348
856 4 0 _uhttps://doi.org/10.1007/978-3-319-64647-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cEBK
999 _c57867
_d57867