Cantitate/Preț
Produs

Constructive Side-Channel Analysis and Secure Design: Lecture Notes in Computer Science

Editat de Elif Bilge Kavun, Michael Pehl
en Limba Engleză Paperback – 28 mar 2023
This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023, held in Munich, Germany, during April 3–4, 2023.

The 12 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: fault-injection analyses and countermeasures; side-channel analyses and countermeasures; attacks on PQC and countermeasure; and analyses and tools.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 40199 lei

Preț vechi: 50249 lei
-20% Nou

Puncte Express: 603

Preț estimativ în valută:
7113 8341$ 6247£

Carte tipărită la comandă

Livrare economică 30 ianuarie-13 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031294969
ISBN-10: 3031294963
Pagini: 276
Ilustrații: X, 263 p. 91 illus., 71 illus. in color.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.42 kg
Ediția:1st edition 2023
Editura: Springer
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

​Fault-Injection Analyses and Countermeasures.- SAMVA: Static Analysis for Multi-Fault Attack Paths Determination.- Efficient attack-surface exploration for electromagnetic fault injection.- A CCFI verification scheme based on the RISC-V Trace Encoder.- Side-Channel Analyses and Countermeasures.- ASCA vs. SASCA - A closer look at the AES key schedule.- Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings.- Improving Side-channel Leakage Assessment using Pre-silicon Leakage Models.- Attacks on PQC and Countermeasures.- Fast First-Order Masked NTTRU.- On the Feasibility of Single-Trace Attacks on the CDT Gaussian Sampler in FrodoKEM.- Punctured Syndrome Decoding Problem: Efficient Side-Channel Attacks Against Classic McEliece.- Analyses and Tools.- Energy Consumption of Protected Cryptographic Hardware Cores - An Experimental Study.- Whiteboxgrind - Automated Analysis of Whitebox Cryptography.- White-box cryptography with global device binding from message recoverable signatures and token-based obfuscation.