My Account Log in

1 option

Constructive Side-Channel Analysis and Secure Design : 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers / edited by Emmanuel Prouff.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Prouff, Emmanuel, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 7864.
Security and Cryptology ; 7864
Language:
English
Subjects (All):
Computer networks.
Data encryption (Computer science).
Management information systems.
Computer science.
Algorithms.
Computer security.
Computers and civilization.
Computer Communication Networks.
Cryptology.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Systems and Data Security.
Computers and Society.
Local Subjects:
Computer Communication Networks.
Cryptology.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Systems and Data Security.
Computers and Society.
Physical Description:
1 online resource (X, 215 pages) : 51 illustrations.
Edition:
First edition 2013.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
System Details:
text file PDF
Summary:
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013. The 13 revised full papers presented together with two invited talks were carefully selected from 39 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.
Contents:
Differential Photonic Emission Analysis
Electromagnetic Glitch on the AES Round Counter
Defeating with Fault Injection a Combined Attack Resistant Exponentiation
Fault Attacks on Projective-to-Affine Coordinates Conversion
Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers
Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis
On 3-Share Threshold Implementations for 4-Bit S-boxes
Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices
Exploring the Relations between Fault Sensitivity and Power Consumption
Improved Side Channel Attacks on Pairing Based Cryptography
Semi-Supervised Template Attack.
Other Format:
Printed edition:
ISBN:
978-3-642-40026-1
9783642400261
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account