Coverart for item
The Resource Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings, edited by Werner Schindler, Sorin A. Huss, (electronic resource)

Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings, edited by Werner Schindler, Sorin A. Huss, (electronic resource)

Label
Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings
Title
Constructive side-channel analysis and secure design
Title remainder
Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings
Statement of responsibility
edited by Werner Schindler, Sorin A. Huss
Creator
Contributor
Provider
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, held in Darmstadt, Germany, May 2012. The 16 revised full papers presented together with two invited talks were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on practical side-channel analysis; secure design; side-channel attacks on RSA; fault attacks; side-channel attacks on ECC; different methods in side-channel analysis
Member of
Cataloging source
GW5XE
Image bit depth
0
LC call number
QA76.9.A25
LC item number
C67 2012eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2012
http://bibfra.me/vocab/lite/meetingName
COSADE 2012
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
1963-
http://library.link/vocab/relatedWorkOrContributorName
  • SpringerLink
  • Schindler, Werner
  • Huss, Sorin A.
Series statement
Lecture Notes in Computer Science,
Series volume
7275
http://library.link/vocab/subjectName
  • Computer security
  • Data encryption (Computer science)
  • Computer security
  • Data encryption (Computer science)
  • Informatique
Label
Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings, edited by Werner Schindler, Sorin A. Huss, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers
  • Shohreh Sharif Mansouri and Elena Dubrova
  • Conversion of Security Proofs from One Leakage Model to Another: A New Issue
  • Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner and Matthieu Rivain, et al.
  • Attacking Exponent Blinding in RSA without CRT
  • Sven Bauer
  • A New Scan Attack on RSA in Presence of Industrial Countermeasures
  • Jean Da Rolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes and Bruno Rouzeyre, et al
  • Exploiting the Difference of Side-Channel Leakages
  • Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt and Stefan Mangard
  • Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario
  • Thomas Korak, Thomas Plos and Michael Hutter
  • 700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy
  • Mathias Wagner
  • An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation
  • Wei He, Eduardo de la Torre and Teresa Riesgo
  • A Closer Look at Security in Random Number Generators Design
  • Viktor Fischer
  • Same Values Power Analysis Using Special Points on Elliptic Curves
  • Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst and David Naccache
  • The Schindler-Itoh-attack in Case of Partial Information Leakage
  • Alexander Krüger
  • Butterfly-Attack on Skein's Modular Addition
  • Michael Zohner, Michael Kasper and Marc Stöttinger
  • MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation
  • Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang and Zhijie Shi, et al.
  • RSA Key Generation: New Attacks
  • Intelligent Machine Homicide
  • Breaking Cryptographic Devices Using Support Vector Machines
  • Annelie Heuser and Michael Zohner
  • Camille Vuillaume, Takashi Endo and Paul Wooderson
  • A Fault Attack on the LED Block Cipher
  • Philipp Jovanovic, Martin Kreuzer and Ilia Polian
  • Differential Fault Analysis of Full LBlock
  • Liang Zhao, Takashi Nishide and Kouichi Sakurai
  • Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator
  • Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer and François Poucheret, et al.
Dimensions
unknown
Extent
1 online resource (x, 264 p.)
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642299117
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
ill. (some col.)
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)792942446
  • (OCoLC)ocn792942446
Label
Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings, edited by Werner Schindler, Sorin A. Huss, (electronic resource)
Publication
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers
  • Shohreh Sharif Mansouri and Elena Dubrova
  • Conversion of Security Proofs from One Leakage Model to Another: A New Issue
  • Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner and Matthieu Rivain, et al.
  • Attacking Exponent Blinding in RSA without CRT
  • Sven Bauer
  • A New Scan Attack on RSA in Presence of Industrial Countermeasures
  • Jean Da Rolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes and Bruno Rouzeyre, et al
  • Exploiting the Difference of Side-Channel Leakages
  • Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt and Stefan Mangard
  • Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario
  • Thomas Korak, Thomas Plos and Michael Hutter
  • 700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy
  • Mathias Wagner
  • An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation
  • Wei He, Eduardo de la Torre and Teresa Riesgo
  • A Closer Look at Security in Random Number Generators Design
  • Viktor Fischer
  • Same Values Power Analysis Using Special Points on Elliptic Curves
  • Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst and David Naccache
  • The Schindler-Itoh-attack in Case of Partial Information Leakage
  • Alexander Krüger
  • Butterfly-Attack on Skein's Modular Addition
  • Michael Zohner, Michael Kasper and Marc Stöttinger
  • MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation
  • Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang and Zhijie Shi, et al.
  • RSA Key Generation: New Attacks
  • Intelligent Machine Homicide
  • Breaking Cryptographic Devices Using Support Vector Machines
  • Annelie Heuser and Michael Zohner
  • Camille Vuillaume, Takashi Endo and Paul Wooderson
  • A Fault Attack on the LED Block Cipher
  • Philipp Jovanovic, Martin Kreuzer and Ilia Polian
  • Differential Fault Analysis of Full LBlock
  • Liang Zhao, Takashi Nishide and Kouichi Sakurai
  • Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator
  • Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer and François Poucheret, et al.
Dimensions
unknown
Extent
1 online resource (x, 264 p.)
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642299117
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
ill. (some col.)
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)792942446
  • (OCoLC)ocn792942446

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...