Constructive Approaches for Security Analysis and Design of Embedded Systems, Kartoniert / Broschiert
Constructive Approaches for Security Analysis and Design of Embedded Systems
- First International Conference, CASCADE 2025, Saint-Etienne, France, April 2-4, 2025, Proceedings
(soweit verfügbar beim Lieferanten)
- Herausgeber:
- Matthieu Rivain, Pascal Sasdrich
- Verlag:
- Springer, 10/2025
- Einband:
- Kartoniert / Broschiert
- Sprache:
- Englisch
- ISBN-13:
- 9783032014047
- Artikelnummer:
- 12340021
- Umfang:
- 616 Seiten
- Gewicht:
- 920 g
- Maße:
- 235 x 155 mm
- Stärke:
- 33 mm
- Erscheinungstermin:
- 21.10.2025
- Hinweis
-
Achtung: Artikel ist nicht in deutscher Sprache!
Klappentext
.-Attacks on Symmetric Cryptography.
.- The Dangerous Message / Key Swap in HMAC.
.- Practical Second-Order CPA Attack on Ascon with Proper Selection Function.
.- Side-Channel Attacks.
.- On the Success Rate of Simple Side-Channel Attacks against Masking with Unlimited Attack Traces.
.- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.
.- Physical Security.
.- Robust and Reliable PUF Protocol Exploiting Non-Monotonic Quantization and Neyman-Pearson Lemma.
.- Towards Package Opening Detection at Power-up by Monitoring Thermal Dissipation.
.- Partial Key Overwrite Attacks in Microcontrollers: a Survey.
.- RISC-V.
.- Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V.
.- A Hardware Design Methodology to Prevent Microarchitectural Transition Leakages.
.- Machine Learning.
.- Taking AI-Based Side-Channel Attacks to a New Dimension.
.- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis.
.- Improving Leakage Exploitability in Horizontal Side Channel Attacks through Anomaly Mitigation with Unsupervised Neural Networks.
.- Profiling Side-Channel Attack on HQC Polynomial Multiplication Using Machine Learning Methods.
.- Attacks on Post-Quantum Cryptography.
.- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM.
.- A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS).
.- Vladimir Sarde and Nicolas Debande.
.- Message-Recovery Horizontal Correlation Attack on Classic McEliece.
.- Breaking HuFu with 0 Leakage: A Side-Channel Analysis.
.- Securing Post-Quantum Cryptography.
.- X2X: Low-Randomness and High-Throughput A2B and B2A conversions for d+1 shares in Hardware.
.- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum Digital Signatures and KEMs.
.- Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms.
.- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation.
.- Homomorphic Encryption and White-Box Cryptography.
.- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks.
.- White-Box Implementation Techniques for the HFE Family.