


default search action
COSADE 2015: Berlin, Germany
- Stefan Mangard, Axel Y. Poschmann:
Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9064, Springer 2015, ISBN 978-3-319-21475-7
Side-Channel Attacks
- Robert Specht
, Johann Heyszl, Martin Kleinsteuber, Georg Sigl:
Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements. 3-19 - Liran Lerman, Romain Poussier, Gianluca Bontempi
, Olivier Markowitch, François-Xavier Standaert
:
Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis). 20-33 - François Durvaux, François-Xavier Standaert
, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville:
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits. 34-50 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks. 51-63 - Takeshi Sugawara
, Daisuke Suzuki, Minoru Saeki:
Two Operands of Multipliers in Side-Channel Attack. 64-78
FPGA Countermeasures
- Alexander Wild, Amir Moradi
, Tim Güneysu
:
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. 81-94 - Pascal Sasdrich
, Oliver Mischke, Amir Moradi
, Tim Güneysu
:
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. 95-107
Timing Attacks and Countermeasures
- Berk Gülmezoglu, Mehmet Sinan Inci, Gorka Irazoqui Apecechea, Thomas Eisenbarth
, Berk Sunar:
A Faster and More Realistic Flush+Reload Attack on AES. 111-126 - Billy Bob Brumley
:
Faster Software for Fast Endomorphisms. 127-140 - Mariya Georgieva, Frédéric de Portzamparc:
Toward Secure Implementation of McEliece Decryption. 141-156
Fault Attacks
- Stjepan Picek, Lejla Batina, Pieter Buzing, Domagoj Jakobovic
:
Fault Injection with a New Flavor: Memetic Algorithms Make a Difference. 159-173 - Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont:
Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers. 174-188 - Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen, Debdeep Mukhopadhyay:
A Biased Fault Attack on the Time Redundancy Countermeasure for AES. 189-203
Countermeasures
- Praveen Kumar Vadnala, Johann Großschädl:
Faster Mask Conversion with Lookup Tables. 207-221 - Michael Muehlberghuber, Thomas Korak, Philipp Dunst, Michael Hutter:
Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC. 222-236
Hands-on Side-Channel Analysis
- Amir Moradi
, Gesine Hinterwälder:
Side-Channel Security Analysis of Ultra-Low-Power FRAM-Based MCUs. 239-254 - Gabriel Goller, Georg Sigl:
Side Channel Attacks on Smartphones and Embedded Devices Using Standard Radio Equipment. 255-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.