Description |
1 online resource (x, 263 pages) : illustrations (some color) |
Series |
Lecture notes in computer science, 1611-3349 ; 13979 |
|
Lecture notes in computer science ; 13979. 1611-3349
|
Contents |
Fault-Injection Analyses and Countermeasures -- SAMVA: Static Analysis for Multi-Fault Attack Paths Determination -- Efficient attack-surface exploration for electromagnetic fault injection -- A CCFI verification scheme based on the RISC-V Trace Encoder -- Side-Channel Analyses and Countermeasures -- ASCA vs. SASCA - A closer look at the AES key schedule -- Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings -- Improving Side-channel Leakage Assessment using Pre-silicon Leakage Models -- Attacks on PQC and Countermeasures -- Fast First-Order Masked NTTRU -- On the Feasibility of Single-Trace Attacks on the CDT Gaussian Sampler in FrodoKEM -- Punctured Syndrome Decoding Problem: Efficient Side-Channel Attacks Against Classic McEliece -- Analyses and Tools -- Energy Consumption of Protected Cryptographic Hardware Cores - An Experimental Study -- Whiteboxgrind - Automated Analysis of Whitebox Cryptography -- White-box cryptography with global device binding from message recoverable signatures and token-based obfuscation |
Summary |
This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023, held in Munich, Germany, during April 3-4, 2023. The 12 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: fault-injection analyses and countermeasures; side-channel analyses and countermeasures; attacks on PQC and countermeasure; and analyses and tools |
Notes |
Includes author index |
Bibliography |
References -- Improving Side-channel Leakage Assessment Using Pre-silicon Leakage Models -- 1 Introduction -- 2 Preliminaries -- 2.1 Side-channel Leakage Assessment Metrics -- 2.2 Target Platform for SLA -- 3 Traditional Side-Channel Vulnerability Analysis -- 3.1 Results Summary -- 3.2 Traditional SLA on Ascon -- 3.3 Traditional SLA on Xoodyak -- 4 Deep Learning Assisted Side Channel Analysis -- 4.1 Deep Learning SLA on Ascon -- 4.2 Deep Learning SLA on Xoodyak -- 5 Analysis of Results -- 6 Conclusion -- References -- Attacks on PQC and Countermeasures -- Fast First-Order Masked NTTRU |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed March 29, 2023) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
Electronic books
|
|
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Kavun, Elif Bilge, editor.
|
|
Pehl, Michael, editor.
|
ISBN |
9783031294976 |
|
3031294971 |
|