Vai al contenuto principale della pagina

Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings / edited by Werner Schindler, Sorin A. Huss



(Visualizza formato Marc21)    (visualizza in BIBRAME 2.0)

Creatore: COSADE 2012 (2012 : Darmstadt, Germany)
Titolo: Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings / edited by Werner Schindler, Sorin A. Huss
Link to work: Constructive side-channel analysis and secure design Visualizza cluster
Pubblicazione: Heidelberg ; New York : Springer, ©2012
Estensione: 1 online resource (x, 264 pages) : illustrations (some color).
Tipo formato: computer
Tipo contenuto: text
Tipo supporto: online resource
Disciplina: 005.8/2
Titolo uniforme di collana: Lecture notes in computer science ; 7275.
Genere/Forma: Electronic books
Conference papers and proceedings
Index term-Uncontrolled: Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Computers and Society
Soggetto non controllato: Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Computers and Society
Termine d'indicizzazione-Occupazione: Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Computers and Society
Classificazione: 54.62
Classificazione LOC: QA76.9.A25 C67 2012eb
Creatori/Collaboratori: Schindler, Werner, , 1963-
Huss, Sorin A. (Sorin Alexander)
Contenuto supplementare: Includes bibliographical references and index.
Nota di contenuto: Exploiting the Difference of Side-Channel Leakages / Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt and Stefan Mangard -- Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario / Thomas Korak, Thomas Plos and Michael Hutter -- 700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy / Mathias Wagner -- An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation / Wei He, Eduardo de la Torre and Teresa Riesgo -- An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers / Shohreh Sharif Mansouri and Elena Dubrova -- Conversion of Security Proofs from One Leakage Model to Another: A New Issue / Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner and Matthieu Rivain, et al. -- Attacking Exponent Blinding in RSA without CRT / Sven Bauer -- A New Scan Attack on RSA in Presence of Industrial Countermeasures / Jean Da Rolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes and Bruno Rouzeyre, et al.
RSA Key Generation: New Attacks / Camille Vuillaume, Takashi Endo and Paul Wooderson -- A Fault Attack on the LED Block Cipher / Philipp Jovanovic, Martin Kreuzer and Ilia Polian -- Differential Fault Analysis of Full LBlock / Liang Zhao, Takashi Nishide and Kouichi Sakurai -- Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator / Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer and François Poucheret, et al. -- A Closer Look at Security in Random Number Generators Design / Viktor Fischer -- Same Values Power Analysis Using Special Points on Elliptic Curves / Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst and David Naccache -- The Schindler-Itoh-attack in Case of Partial Information Leakage / Alexander Krüger -- Butterfly-Attack on Skein's Modular Addition / Michael Zohner, Michael Kasper and Marc Stöttinger -- MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation / Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang and Zhijie Shi, et al. -- Intelligent Machine Homicide / Breaking Cryptographic Devices Using Support Vector Machines / Annelie Heuser and Michael Zohner.
Restrizioni accesso: Access is restricted to users affiliated with licensed institutions.
Sommario/riassunto: Annotation
Collana: Lecture notes in computer science, 0302-9743 ; 7275
ISBN: 9783642299124
3642299121
3642299113
9783642299117
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 004375032
Localizzazioni e accesso elettronico http://link.springer.com/10.1007/978-3-642-29912-4
Collocazione: Electronic access
Lo trovi qui: New York University