Constructive Side-Channel Analysis and Secure Design: 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings

Author:   Josep Balasch ,  Colin O’Flynn
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2022
Volume:   13211
ISBN:  

9783030997656


Pages:   277
Publication Date:   29 March 2022
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $155.22 Quantity:  
Add to Cart

Share |

Constructive Side-Channel Analysis and Secure Design: 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Josep Balasch ,  Colin O’Flynn
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2022
Volume:   13211
Weight:   0.444kg
ISBN:  

9783030997656


ISBN 10:   3030997650
Pages:   277
Publication Date:   29 March 2022
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Machine/Deep Learning.- Machine-Learning assisted Side-Channel Attacks on RNS ECC Implementations using Hybrid Feature Engineering.- Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis.- On the Evaluation of Deep Learning-based Side-channel Analysis.- Tools & References A Second Look at the ASCAD Databases.- FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication.- Body Biasing Injection: To thin or not to thin the substrate?.- Attacks On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks.- Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE.- Canonical DPA attack on HMAC-SHA1/SHA2.- Masking Provable Secure Software Masking in the Real-World.- Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber.- Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List