


default search action
14th COSADE 2023: Munich, Germany
- Elif Bilge Kavun
, Michael Pehl
:
Constructive Side-Channel Analysis and Secure Design - 14th International Workshop, COSADE 2023, Munich, Germany, April 3-4, 2023, Proceedings. Lecture Notes in Computer Science 13979, Springer 2023, ISBN 978-3-031-29496-9
Fault-Injection Analyses and Countermeasures
- Antoine Gicquel
, Damien Hardy, Karine Heydemann
, Erven Rohou
:
SAMVA: Static Analysis for Multi-fault Attack Paths Determination. 3-22 - Daniele Antonio Emanuele Carta
, Vittorio Zaccaria
, Gabriele Quagliarella, Maria Chiara Molteni
:
Efficient Attack-Surface Exploration for Electromagnetic Fault Injection. 23-41 - Anthony Zgheib, Olivier Potin, Jean-Baptiste Rigaud
, Jean-Max Dutertre:
A CCFI Verification Scheme Based on the RISC-V Trace Encoder. 42-61
Side-Channel Analyses and Countermeasures
- Emanuele Strieder
, Manuel Ilg, Johann Heyszl, Florian Unterstein
, Silvan Streit
:
ASCA vs. SASCA - A Closer Look at the AES Key Schedule. 65-85 - Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. 86-104 - Dillibabu Shanmugam, Patrick Schaumont:
Improving Side-channel Leakage Assessment Using Pre-silicon Leakage Models. 105-124
Attacks on PQC and Countermeasures
- Daniel Heinz, Gabi Dreo Rodosek:
Fast First-Order Masked NTTRU. 127-148 - Soundes Marzougui, Ievgen Kabin
, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert:
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT. 149-169 - Vincent Grosso
, Pierre-Louis Cayrel
, Brice Colombier
, Vlad-Florin Dragoi
:
Punctured Syndrome Decoding Problem - Efficient Side-Channel Attacks Against Classic McEliece. 170-192
Analyses and Tools
- Aein Rezaei Shahmirzadi
, Thorben Moos
, Amir Moradi
:
Energy Consumption of Protected Cryptographic Hardware Cores - An Experimental Study. 195-220 - Tobias Holl, Katharina Bogad, Michael Gruber:
Whiteboxgrind - Automated Analysis of Whitebox Cryptography. 221-240 - Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven J. Watson:
White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation. 241-261

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.