Table of Contents for: Constructive side-channel analysis and s

 Staff view

You must be logged in to Tag Records

Constructive side-channel analysis and secure design [electronic resource] : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings /

edited by Werner Schindler, Sorin A. Huss.

Book Cover
Names: Schindler, Werner, | Huss, Sorin A.
Published: Heidelberg ; Springer, c2012.
Series: Lecture notes in computer science ; 7275.
LNCS sublibrary. SL 4, Security and cryptology.
Topics: Computer security - Congresses. | Data encryption (Computer science) - Congresses.
Genres: Electronic books.
Tags: Add

Spaces will separate tags.
Use quotes for multi-word tags.

Exploiting the Difference of Side-Channel Leakages / Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt and Stefan Mangard -- Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario / Thomas Korak, Thomas Plos and Michael Hutter -- 700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy / Mathias Wagner -- An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation / Wei He, Eduardo de la Torre and Teresa Riesgo -- An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers / Shohreh Sharif Mansouri and Elena Dubrova -- Conversion of Security Proofs from One Leakage Model to Another: A New Issue / Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner and Matthieu Rivain, et al. -- Attacking Exponent Blinding in RSA without CRT / Sven Bauer -- A New Scan Attack on RSA in Presence of Industrial Countermeasures / Jean Da Rolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes and Bruno Rouzeyre, et al.
RSA Key Generation: New Attacks / Camille Vuillaume, Takashi Endo and Paul Wooderson -- A Fault Attack on the LED Block Cipher / Philipp Jovanovic, Martin Kreuzer and Ilia Polian -- Differential Fault Analysis of Full LBlock / Liang Zhao, Takashi Nishide and Kouichi Sakurai -- Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator / Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer and François Poucheret, et al. -- A Closer Look at Security in Random Number Generators Design / Viktor Fischer -- Same Values Power Analysis Using Special Points on Elliptic Curves / Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst and David Naccache -- The Schindler-Itoh-attack in Case of Partial Information Leakage / Alexander Krüger -- Butterfly-Attack on Skein's Modular Addition / Michael Zohner, Michael Kasper and Marc Stöttinger -- MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation / Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang and Zhijie Shi, et al. -- Intelligent Machine Homicide / Breaking Cryptographic Devices Using Support Vector Machines / Annelie Heuser and Michael Zohner.

Table of Contents for: Constructive side-channel analysis and s