1 option
Constructive Approaches for Security Analysis and Design of Embedded Systems : First International Conference, CASCADE 2025, Saint-Etienne, France, April 2–4, 2025, Proceedings / edited by Matthieu Rivain, Pascal Sasdrich.
Springer Nature - Springer Computer Science eBooks 2026 English International Available online
View online- Format:
- Book
- Author/Creator:
- Rivain, Matthieu.
- Series:
- Lecture Notes in Computer Science, 1611-3349 ; 15952
- Language:
- English
- Subjects (All):
- Cryptography.
- Data encryption (Computer science).
- Computer networks.
- Data protection.
- Computer systems.
- Computers--Law and legislation.
- Computers.
- Information technology--Law and legislation.
- Information technology.
- Computers, Special purpose.
- Cryptology.
- Computer Communication Networks.
- Data and Information Security.
- Computer System Implementation.
- Legal Aspects of Computing.
- Special Purpose and Application-Based Systems.
- Local Subjects:
- Cryptology.
- Computer Communication Networks.
- Data and Information Security.
- Computer System Implementation.
- Legal Aspects of Computing.
- Special Purpose and Application-Based Systems.
- Physical Description:
- 1 online resource (891 pages)
- Edition:
- 1st ed. 2026.
- Place of Publication:
- Cham : Springer Nature Switzerland : Imprint: Springer, 2026.
- Summary:
- This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025. The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.
- Contents:
- .-Attacks on Symmetric Cryptography.
- The Dangerous Message/Key Swap in HMAC.
- Practical Second-Order CPA Attack on Ascon with Proper Selection Function.
- Side-Channel Attacks.
- On the Success Rate of Simple Side-Channel Attacks against Masking with Unlimited Attack Traces.
- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.
- Physical Security.
- Robust and Reliable PUF Protocol Exploiting Non-Monotonic Quantization and Neyman-Pearson Lemma.
- Towards Package Opening Detection at Power-up by Monitoring Thermal Dissipation.
- Partial Key Overwrite Attacks in Microcontrollers: a Survey.
- RISC-V.
- Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V.
- A Hardware Design Methodology to Prevent Microarchitectural Transition Leakages.
- Machine Learning.
- Taking AI-Based Side-Channel Attacks to a New Dimension.
- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis.
- Improving Leakage Exploitability in Horizontal Side Channel Attacks through Anomaly Mitigation with Unsupervised Neural Networks.
- Profiling Side-Channel Attack on HQC Polynomial Multiplication Using Machine Learning Methods.
- Attacks on Post-Quantum Cryptography.
- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM.
- A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS).
- Vladimir Sarde and Nicolas Debande.
- Message-Recovery Horizontal Correlation Attack on Classic McEliece.
- Breaking HuFu with 0 Leakage: A Side-Channel Analysis.
- Securing Post-Quantum Cryptography.
- X2X: Low-Randomness and High-Throughput A2B and B2A conversions for d+1 shares in Hardware.
- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum Digital Signatures and KEMs.
- Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms.
- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation.
- Homomorphic Encryption and White-Box Cryptography.
- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks.
- White-Box Implementation Techniques for the HFE Family. .
- Notes:
- Description based on publisher supplied metadata and other sources.
- ISBN:
- 3-032-01405-0
- 9783032014054
- OCLC:
- 1553138680
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.