Constructive Side-Channel Analysis and Secure Design 15th International Workshop, COSADE 2024, Gardanne, France, April 9-10, 2024, Proceedings / [electronic resource] :
by Romain Wacquez ; edited by Naofumi Homma.
- 1st ed. 2024.
- X, 282 p. 115 illus., 92 illus. in color. online resource.
- Lecture Notes in Computer Science, 14595 1611-3349 ; .
- Lecture Notes in Computer Science, 14595 .
Analyses and Tools -- Characterizing and Modeling Synchronous Clock-Glitch Fault Injection -- On-chip evaluation of voltage drops and fault occurrence induced by Si backside EM injection -- EFFLUX-F2: A high performance hardware security evaluation board -- Attack Methods -- Practical Improvements to Statistical Ineffective Fault Attacks -- CAPABARA: A Combined Attack on CAPA -- Deep-Learning-Based Side-Channel Attacks -- Exploring Multi-Task Learning in the Context of Masked AES Implementations -- The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression -- Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption -- PUF/RNG -- Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF -- Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators -- Lightweight Leakage-Resilient PRNG from TBCs using Superposition -- Cryptographic Implementations -- The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+ -- HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme -- Combining Loop Shuffling and Code Polymorphism for Enhanced AES Side-Channel Security.
This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024, held in Gardanne, France, during April 9-10, 2024. The 14 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Analyses and Tools; Attack Methods; Deep-Learning-Based Side-Channel Attacks; PUF/RNG; and Cryptographic Implementations.
9783031575433
10.1007/978-3-031-57543-3 doi
Data protection. Computers--Law and legislation. Information technology--Law and legislation. Computer networks . Computers, Special purpose. Computer systems. Microprogramming . Data and Information Security. Legal Aspects of Computing. Computer Communication Networks. Special Purpose and Application-Based Systems. Computer System Implementation. Control Structures and Microprogramming.