Constructive Side-Channel Analysis and Secure Design
Springer International Publishing (Verlag)
978-3-319-21475-7 (ISBN)
Side-Channel Attacks.- Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements.- Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).- Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits.- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks.- Two Operands of Multipliers in Side-Channel Attack.- FPGA Countermeasures.- Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs.- Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware.- Timing Attacks and Countermeasures.- A Faster and More Realistic Flush+Reload Attack on AES.- Faster software for fast endomorphisms.- Toward Secure Implementation of McEliece Decryption.- Fault Attacks.- Fault Injection with a new favor: Memetic Algorithms make a difference.- Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers.- A Biased Fault Attack on the Time Redundancy Countermeasure for AES.- Countermeasures.- Faster Mask Conversion with Lookup Tables.- Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC.- Hands-on Side-Channel Analysis Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs.- Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment.
Erscheint lt. Verlag | 24.7.2015 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 271 p. 87 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Countermeasures • Cryptanalysis • cryptography • Elliptic Curve Cryptography • embedded systems security • fault analysis • fault attacks • FPGA • hardware security • Known ciphertext attack • Leakage resilience • Mathematical Foundations • Memetic Algorithms • Physical attacks • rsa • Security and Privacy • side-channel attacks • Smart cards • Tamper-proof • tamper-resistant designs • timing attacks |
ISBN-10 | 3-319-21475-6 / 3319214756 |
ISBN-13 | 978-3-319-21475-7 / 9783319214757 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich