000 | 04071nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-031-29497-6 | ||
003 | DE-He213 | ||
005 | 20240423125455.0 | ||
007 | cr nn 008mamaa | ||
008 | 230322s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031294976 _9978-3-031-29497-6 |
||
024 | 7 |
_a10.1007/978-3-031-29497-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aConstructive Side-Channel Analysis and Secure Design _h[electronic resource] : _b14th International Workshop, COSADE 2023, Munich, Germany, April 3–4, 2023, Proceedings / _cedited by Elif Bilge Kavun, Michael Pehl. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aX, 263 p. 91 illus., 71 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13979 |
|
505 | 0 | _aFault-Injection Analyses and Countermeasures -- SAMVA: Static Analysis for Multi-Fault Attack Paths Determination -- Efficient attack-surface exploration for electromagnetic fault injection -- A CCFI verification scheme based on the RISC-V Trace Encoder -- Side-Channel Analyses and Countermeasures -- ASCA vs. SASCA - A closer look at the AES key schedule -- Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings -- Improving Side-channel Leakage Assessment using Pre-silicon Leakage Models -- Attacks on PQC and Countermeasures -- Fast First-Order Masked NTTRU -- On the Feasibility of Single-Trace Attacks on the CDT Gaussian Sampler in FrodoKEM -- Punctured Syndrome Decoding Problem: Efficient Side-Channel Attacks Against Classic McEliece -- Analyses and Tools -- Energy Consumption of Protected Cryptographic Hardware Cores - An Experimental Study -- Whiteboxgrind - Automated Analysis of Whitebox Cryptography -- White-box cryptography with global device binding from message recoverable signatures and token-based obfuscation. | |
520 | _aThis book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023, held in Munich, Germany, during April 3–4, 2023. The 12 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: fault-injection analyses and countermeasures; side-channel analyses and countermeasures; attacks on PQC and countermeasure; and analyses and tools. | ||
650 | 0 | _aData protection. | |
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 0 |
_aInformation technology _xLaw and legislation. |
|
650 | 0 | _aComputer networks . | |
650 | 0 | _aComputers, Special purpose. | |
650 | 0 | _aComputer systems. | |
650 | 0 | _aMicroprogramming . | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSpecial Purpose and Application-Based Systems. |
650 | 2 | 4 | _aComputer System Implementation. |
650 | 2 | 4 | _aControl Structures and Microprogramming. |
700 | 1 |
_aKavun, Elif Bilge. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPehl, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031294969 |
776 | 0 | 8 |
_iPrinted edition: _z9783031294983 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13979 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-29497-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c178324 _d178324 |