Stop the war!
Остановите войну!
for scientists:
default search action
12th COSADE 2021: Lugano, Switzerland
- Shivam Bhasin, Fabrizio De Santis:
Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, COSADE 2021, Lugano, Switzerland, October 25-27, 2021, Proceedings. Lecture Notes in Computer Science 12910, Springer 2021, ISBN 978-3-030-89914-1
Side-Channel Analysis
- Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi:
SideLine: How Delay-Lines (May) Leak Secrets from Your SoC. 3-30 - Yaacov Belenky, Ira Dushar, Valery Teper, Hennadii Chernyshchyk, Leonid Azriel, Yury Kreimer:
First Full-Fledged Side Channel Attack on HMAC-SHA-2. 31-52 - Guilherme Perin, Ileana Buhan, Stjepan Picek:
Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis. 53-81
Fault Attacks
- Sayandeep Saha, Debdeep Mukhopadhyay:
Transform Without Encode is not Sufficient for SIFA and FTA Security: A Case Study. 85-104 - Guillaume Barbu, Laurent Castelnovi, Thomas Chabrier:
Generalizing Statistical Ineffective Fault Attacks in the Spirit of Side-Channel Attacks. 105-125
Countermeasures
- Davide Poggi, Philippe Maurine, Thomas Ordas, Alexandre Sarafianos:
Protecting Secure ICs Against Side-Channel Attacks by Identifying and Quantifying Potential EM and Leakage Hotspots at Simulation Stage. 129-147 - Nicolai Müller, Thorben Moos, Amir Moradi:
Low-Latency Hardware Masking of PRINCE. 148-167 - Balazs Udvarhelyi, Olivier Bronchain, François-Xavier Standaert:
Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP. 168-183 - Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot:
White-Box ECDSA: Challenges and Existing Solutions. 184-201
Post-quantum Cryptography
- Aurélien Greuet, Simon Montoya, Guénaël Renault:
On Using RSA/ECC Coprocessor for Ideal Lattice-Based Key Exchange. 205-227 - Aymeric Genêt, Natacha Linard de Guertechin, Novak Kaluderovic:
Full Key Recovery Side-Channel Attack Against Ephemeral SIKE on the Cortex-M4. 228-254 - Élise Tasso, Luca De Feo, Nadia El Mrabet, Simon Pontié:
Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack. 255-276
Physical Unclonable Functions
- Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl:
Analysis and Protection of the Two-Metric Helper Data Scheme. 279-302 - Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks. 303-321
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.