Constructive Side-Channel Analysis and Secure Design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Guilley, Sylvain. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Colección:Security and Cryptology ; 10348
Materias:
LEADER 02993nam a22004095i 4500
001 000280448
005 20210628100033.0
007 cr nn 008mamaa
008 170728s2017 gw | s |||| 0|eng d
020 |a 9783319646473 
024 7 |a 10.1007/978-3-319-64647-3  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Constructive Side-Channel Analysis and Secure Design :  |b 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers /  |c edited by Sylvain Guilley. 
250 |a 1st ed. 2017. 
260 # # |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a X, 299 p. 127 illus. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Security and Cryptology ;  |v 10348 
505 0 |a Does Coupling Affect the Security of Masked Implementations -- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA -- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors -- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA -- On the Construction of Side-Channel Attack Resilient S-boxes -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices -- Side-Channel Analysis of Keymill -- On the Easiness of Turning Higher-Order Leakages into First-Order -- Side-Channel Attacks against the Human Brain: The PIN Code Case Study -- Impacts of Technology Trends on Physical Attacks -- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go -- DFA on LS-Designs with a Practical Implementation on SCREAM -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors -- Getting the Most out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand -- Mind the Gap: Towards Secure 1st-Order Masking in Software. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Architecture, Computer. 
650 0 |a Computer science—Mathematics. 
650 0 |a Microprogramming . 
650 1 4 |a Systems and Data Security. 
650 2 4 |a Cryptology. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Computer System Implementation. 
650 2 4 |a Discrete Mathematics in Computer Science. 
650 2 4 |a Control Structures and Microprogramming. 
700 1 |a Guilley, Sylvain.  |e editor.  |0 (orcid)0000-0002-5044-3534  |1 https://orcid.org/0000-0002-5044-3534 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks