000 | 04365nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-319-64647-3 | ||
003 | DE-He213 | ||
005 | 20240730190410.0 | ||
007 | cr nn 008mamaa | ||
008 | 170728s2017 sz | s |||| 0|eng d | ||
020 |
_a9783319646473 _9978-3-319-64647-3 |
||
024 | 7 |
_a10.1007/978-3-319-64647-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aConstructive Side-Channel Analysis and Secure Design _h[electronic resource] : _b8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers / _cedited by Sylvain Guilley. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aX, 299 p. 127 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v10348 |
|
505 | 0 | _aDoes Coupling Affect the Security of Masked Implementations -- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA -- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors -- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA -- On the Construction of Side-Channel Attack Resilient S-boxes -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices -- Side-Channel Analysis of Keymill -- On the Easiness of Turning Higher-Order Leakages into First-Order -- Side-Channel Attacks against the Human Brain: The PIN Code Case Study -- Impacts of Technology Trends on Physical Attacks -- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go -- DFA on LS-Designs with a Practical Implementation on SCREAM -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors -- Getting the Most out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand -- Mind the Gap: Towards Secure 1st-Order Masking in Software. | |
520 | _aThis book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9142364 |
|
650 | 0 |
_aComputer systems. _9142365 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aDiscrete mathematics. _912873 |
|
650 | 0 |
_aMicroprogramming . _932081 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aComputer System Implementation. _938514 |
650 | 2 | 4 |
_aDiscrete Mathematics in Computer Science. _931837 |
650 | 2 | 4 |
_aControl Structures and Microprogramming. _932083 |
700 | 1 |
_aGuilley, Sylvain. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9142366 |
|
710 | 2 |
_aSpringerLink (Online service) _9142367 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319646466 |
776 | 0 | 8 |
_iPrinted edition: _z9783319646480 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v10348 _9142368 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-64647-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93234 _d93234 |