Wacquez, Romain.

Constructive Side-Channel Analysis and Secure Design 15th International Workshop, COSADE 2024, Gardanne, France, April 9-10, 2024, Proceedings / [electronic resource] : by Romain Wacquez ; edited by Naofumi Homma. - 1st ed. 2024. - X, 282 p. 115 illus., 92 illus. in color. online resource. - Lecture Notes in Computer Science, 14595 1611-3349 ; . - Lecture Notes in Computer Science, 14595 .

Analyses and Tools -- Characterizing and Modeling Synchronous Clock-Glitch Fault Injection -- On-chip evaluation of voltage drops and fault occurrence induced by Si backside EM injection -- EFFLUX-F2: A high performance hardware security evaluation board -- Attack Methods -- Practical Improvements to Statistical Ineffective Fault Attacks -- CAPABARA: A Combined Attack on CAPA -- Deep-Learning-Based Side-Channel Attacks -- Exploring Multi-Task Learning in the Context of Masked AES Implementations -- The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression -- Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption -- PUF/RNG -- Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF -- Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators -- Lightweight Leakage-Resilient PRNG from TBCs using Superposition -- Cryptographic Implementations -- The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+ -- HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme -- Combining Loop Shuffling and Code Polymorphism for Enhanced AES Side-Channel Security.

This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024, held in Gardanne, France, during April 9-10, 2024. The 14 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Analyses and Tools; Attack Methods; Deep-Learning-Based Side-Channel Attacks; PUF/RNG; and Cryptographic Implementations.

9783031575433

10.1007/978-3-031-57543-3 doi


Data protection.
Computers--Law and legislation.
Information technology--Law and legislation.
Computer networks .
Computers, Special purpose.
Computer systems.
Microprogramming .
Data and Information Security.
Legal Aspects of Computing.
Computer Communication Networks.
Special Purpose and Application-Based Systems.
Computer System Implementation.
Control Structures and Microprogramming.

QA76.9.A25

005.8