Smart Card Research and Advanced Applications
Springer International Publishing (Verlag)
978-3-030-15461-5 (ISBN)
The 13 revised full papers presented in this book were carefully reviewed and selected from 28 submissions.
CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.
Convolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations.- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES.- Improving Side-channel Analysis through Semi-supervised Learning.- Non-profiled Mask Recovery: the impact of Independent Component Analysis.- How (not) to Use Welch's T-test in Side-Channel Security Evaluations.- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys.- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M.- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication.- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs.- Electromagnetic Activity vs. Logical Activity : Near Field Scans for Reverse Engineering.- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P.- Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices.- Exploiting JCVM on smart cards using forged references in the API calls.
Erscheinungsdatum | 23.03.2019 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 201 p. 135 illus., 59 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 332 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Applications • Artificial Intelligence • authentication • backpropagation • Computer Architecture • Computer Science • conference proceedings • cryptography • Data Security • differential power analysis • Embedded Software • Embedded Systems • Informatics • Internet of Things (IoT) • java card • Microcontrollers • Neural networks • Public Key Cryptography • Research • Reverse Engineering • side-channel • side channel attack • Smart card • Template attacks |
ISBN-10 | 3-030-15461-0 / 3030154610 |
ISBN-13 | 978-3-030-15461-5 / 9783030154615 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich