000 03983nam a22006735i 4500
001 978-3-319-43283-0
003 DE-He213
005 20240730191833.0
007 cr nn 008mamaa
008 160725s2016 sz | s |||| 0|eng d
020 _a9783319432830
_9978-3-319-43283-0
024 7 _a10.1007/978-3-319-43283-0
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aConstructive Side-Channel Analysis and Secure Design
_h[electronic resource] :
_b7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers /
_cedited by François-Xavier Standaert, Elisabeth Oswald.
250 _a1st ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aX, 219 p. 74 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v9689
505 0 _aSecurity and Physical Attacks -- Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption -- Co-location detection on the Cloud -- Simple Photonic Emission Attack with Reduced Data Complexity -- Side-Channel Analysis (case studies) -- Power Analysis Attacks against IEEE 802.15.4 Node -- Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series -- Dismantling real-world ECC with Horizontal and Vertical Template Attacks -- Fault Analysis -- Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT -- Improved Differential Fault Analysis on Camellia-128 -- A Note on the Security of CHES 2014 Symmetric Infective Countermeasure -- Side-Channel Analysis (tools) -- Simpler, Faster, and More Robust T-test Based Leakage Detection -- Design and implementation of a waveform-matching based triggering system -- Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order.
520 _aThis book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. The 12 papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named: security and physical attacks; side-channel analysis (case studies); fault analysis; and side-channel analysis (tools).
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aData protection.
_97245
650 0 _aElectronic data processing
_xManagement.
_9147504
650 0 _aAlgorithms.
_93390
650 0 _aComputer science
_xMathematics.
_93866
650 0 _aDiscrete mathematics.
_912873
650 0 _aComputers.
_98172
650 1 4 _aCryptology.
_931769
650 2 4 _aData and Information Security.
_931990
650 2 4 _aIT Operations.
_931703
650 2 4 _aAlgorithms.
_93390
650 2 4 _aDiscrete Mathematics in Computer Science.
_931837
650 2 4 _aComputer Hardware.
_933420
700 1 _aStandaert, François-Xavier.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9147505
700 1 _aOswald, Elisabeth.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9147506
710 2 _aSpringerLink (Online service)
_9147507
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319432823
776 0 8 _iPrinted edition:
_z9783319432847
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v9689
_9147508
856 4 0 _uhttps://doi.org/10.1007/978-3-319-43283-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c93929
_d93929