default search action
8th COSADE 2017: Paris, France
- Sylvain Guilley:
Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10348, Springer 2017, ISBN 978-3-319-64646-6 - Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen:
Does Coupling Affect the Security of Masked Implementations? 1-18 - Kashif Nawaz, Dina Kamel, François-Xavier Standaert, Denis Flandre:
Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study. 19-33 - Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht:
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA. 34-49 - Rei Ueno, Naofumi Homma, Takafumi Aoki:
Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation. 50-64 - Jeremy Dubeuf, David Hély, Vincent Beroulle:
Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors. 65-82 - Maik Ender, Alexander Wild, Amir Moradi:
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA. 83-101 - Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch:
On the Construction of Side-Channel Attack Resilient S-boxes. 102-119 - Yoo-Seung Won, Dong-Guk Han:
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices. 120-137 - Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. 138-152 - Thorben Moos, Amir Moradi:
On the Easiness of Turning Higher-Order Leakages into First-Order. 153-170 - Joseph Lange, Clément Massart, André Mouraux, François-Xavier Standaert:
Side-Channel Attacks Against the Human Brain: The PIN Code Case Study. 171-189 - Philippe Maurine, Sylvain Guilley:
Impacts of Technology Trends on Physical Attacks? 190-206 - Oscar M. Guillen, Michael Gruber, Fabrizio De Santis:
Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go? 207-222 - Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey:
DFA on LS-Designs with a Practical Implementation on SCREAM. 223-247 - Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki:
Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors. 248-263 - Santos Merino Del Pozo, François-Xavier Standaert:
Getting the Most Out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand. 264-281 - Kostas Papagiannopoulos, Nikita Veshchikov:
Mind the Gap: Towards Secure 1st-Order Masking in Software. 282-297
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.