


default search action
15th COSADE 2024: Gardanne, France
- Romain Wacquez, Naofumi Homma:

Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Gardanne, France, April 9-10, 2024, Proceedings. Lecture Notes in Computer Science 14595, Springer 2024, ISBN 978-3-031-57542-6
Analyses and Tools
- Amélie Marotta, Ronan Lashermes, Guillaume Bouffard, Olivier Sentieys, Rachid Dafali:

Characterizing and Modeling Synchronous Clock-Glitch Fault Injection. 3-21 - Rikuu Hasegawa, Kazuki Monta, Takuya Wadatsumi, Takuji Miki, Makoto Nagata:

On-Chip Evaluation of Voltage Drops and Fault Occurrence Induced by Si Backside EM Injection. 22-37 - Arpan Jati

, Naina Gupta
, Anupam Chattopadhyay
, Somitra Kumar Sanadhya
:
EFFLUX-F2: A High Performance Hardware Security Evaluation Board. 38-56
Attack Methods
- Baris Ege

, Bob Swinkels
, Dilara Toprakhisar
, Praveen Kumar Vadnala
:
Practical Improvements to Statistical Ineffective Fault Attacks. 59-75 - Dilara Toprakhisar

, Svetla Nikova
, Ventzislav Nikov:
CAPABARA: A Combined Attack on CAPA. 76-89
Deep-learning-based Side-channel Attacks
- Thomas Marquet, Elisabeth Oswald

:
Exploring Multi-task Learning in the Context of Masked AES Implementations. 93-112 - Ioana Savu, Marina Krcek, Guilherme Perin, Lichao Wu, Stjepan Picek:

The Need for MORE: Unsupervised Side-Channel Analysis with Single Network Training and Multi-output Regression. 113-132 - Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger

, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations. 133-154
PUF/RNG
- Niklas Stein

, Michael Pehl
:
Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF. 157-176 - Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:

Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators. 177-196 - Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin:

Lightweight Leakage-Resilient PRNG from TBCs Using Superposition. 197-217
Cryptographic Implementations
- Patrick Karl

, Jonas Schupp
, Georg Sigl
:
The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+. 221-239 - Oussama Sayari, Soundes Marzougui, Thomas Aulbach, Juliane Krämer, Jean-Pierre Seifert:

HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme. 240-259 - Nicolas Belleville, Loïc Masure:

Combining Loop Shuffling and Code PolyMorphism for Enhanced AES Side-Channel Security. 260-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














