語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Constructive side-channel analysis a...
~
COSADE (Workshop) (2017 :)
FindBook
Google Book
Amazon
博客來
Constructive side-channel analysis and secure design = 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Constructive side-channel analysis and secure design/ edited by Sylvain Guilley.
其他題名:
8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers /
其他題名:
COSADE 2017
其他作者:
Guilley, Sylvain.
團體作者:
COSADE (Workshop)
出版者:
Cham :Springer International Publishing : : 2017.,
面頁冊數:
x, 299 p. :ill., digital ;24 cm.
內容註:
Does Coupling Affect the Security of Masked Implementations -- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA -- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors -- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA -- On the Construction of Side-Channel Attack Resilient S-boxes -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices -- Side-Channel Analysis of Keymill -- On the Easiness of Turning Higher-Order Leakages into First-Order -- Side-Channel Attacks against the Human Brain: The PIN Code Case Study -- Impacts of Technology Trends on Physical Attacks -- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go -- DFA on LS-Designs with a Practical Implementation on SCREAM -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors -- Getting the Most out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand -- Mind the Gap: Towards Secure 1st-Order Masking in Software.
Contained By:
Springer eBooks
標題:
Data encryption (Computer science) - Congresses. -
電子資源:
http://dx.doi.org/10.1007/978-3-319-64647-3
ISBN:
9783319646473
Constructive side-channel analysis and secure design = 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers /
Constructive side-channel analysis and secure design
8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers /[electronic resource] :COSADE 2017edited by Sylvain Guilley. - Cham :Springer International Publishing :2017. - x, 299 p. :ill., digital ;24 cm. - Lecture notes in computer science,103480302-9743 ;. - Lecture notes in computer science ;10348..
Does Coupling Affect the Security of Masked Implementations -- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA -- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors -- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA -- On the Construction of Side-Channel Attack Resilient S-boxes -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices -- Side-Channel Analysis of Keymill -- On the Easiness of Turning Higher-Order Leakages into First-Order -- Side-Channel Attacks against the Human Brain: The PIN Code Case Study -- Impacts of Technology Trends on Physical Attacks -- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go -- DFA on LS-Designs with a Practical Implementation on SCREAM -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors -- Getting the Most out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand -- Mind the Gap: Towards Secure 1st-Order Masking in Software.
This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools.
ISBN: 9783319646473
Standard No.: 10.1007/978-3-319-64647-3doiSubjects--Topical Terms:
844473
Data encryption (Computer science)
--Congresses.
LC Class. No.: QA76.9.A25 / C67 2017
Dewey Class. No.: 005.824
Constructive side-channel analysis and secure design = 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers /
LDR
:03060nmm a2200349 a 4500
001
2105543
003
DE-He213
005
20170728184543.0
006
m d
007
cr nn 008maaau
008
180417s2017 gw s 0 eng d
020
$a
9783319646473
$q
(electronic bk.)
020
$a
9783319646466
$q
(paper)
024
7
$a
10.1007/978-3-319-64647-3
$2
doi
035
$a
978-3-319-64647-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C67 2017
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
C834 2017
111
2
$a
COSADE (Workshop)
$n
(8th :
$d
2017 :
$c
Paris, France)
$3
3250505
245
1 0
$a
Constructive side-channel analysis and secure design
$h
[electronic resource] :
$b
8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers /
$c
edited by Sylvain Guilley.
246
3
$a
COSADE 2017
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
x, 299 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
10348
505
0
$a
Does Coupling Affect the Security of Masked Implementations -- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA -- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors -- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA -- On the Construction of Side-Channel Attack Resilient S-boxes -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices -- Side-Channel Analysis of Keymill -- On the Easiness of Turning Higher-Order Leakages into First-Order -- Side-Channel Attacks against the Human Brain: The PIN Code Case Study -- Impacts of Technology Trends on Physical Attacks -- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go -- DFA on LS-Designs with a Practical Implementation on SCREAM -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors -- Getting the Most out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand -- Mind the Gap: Towards Secure 1st-Order Masking in Software.
520
$a
This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools.
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Data Encryption.
$3
891254
650
2 4
$a
Management of Computing and Information Systems.
$3
892490
650
2 4
$a
Computer System Implementation.
$3
892710
650
2 4
$a
Discrete Mathematics in Computer Science.
$3
892513
650
2 4
$a
Control Structures and Microprogramming.
$3
895886
700
1
$a
Guilley, Sylvain.
$3
3226661
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
10348.
$3
3250506
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-64647-3
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9322075
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 C67 2017
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入