


default search action
21st CARDIS 2022: Birmingham, UK
- Ileana Buhan

, Tobias Schneider
:
Smart Card Research and Advanced Applications - 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13820, Springer 2023, ISBN 978-3-031-25318-8
Physical Attacks
- Nimish Mishra

, Anirban Chakraborty
, Urbi Chatterjee
, Debdeep Mukhopadhyay
:
Time's a Thief of Memory - Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels. 3-24 - Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin:

Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing. 25-44 - Raphaël Joud, Pierre-Alain Moëllic

, Simon Pontié, Jean-Baptiste Rigaud
:
A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters. 45-65
Physical Countermeasures
- Loïc Masure

, Olivier Rioul
, François-Xavier Standaert
:
A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations. 69-81 - Yaoan Jin

, Atsuko Miyaji
:
Short-Iteration Constant-Time GCD and Modular Inversion. 82-99
Protecting AES
- Amund Askeland, Siemen Dhooghe

, Svetla Nikova
, Vincent Rijmen
, Zhenda Zhang
:
Guarding the First Order: The Rise of AES Maskings. 103-122 - Luan Cardoso dos Santos, François Gérard, Johann Großschädl, Lorenzo Spignoli:

Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES. 123-145 - Mateus Simoes, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno:

Self-timed Masking: Implementing Masked S-Boxes Without Registers. 146-164
Evaluation Methodologies
- Arturo Mollinedo Garay

, Florent Bernard
, Viktor Fischer
, Patrick Haddad
, Ugo Mureddu
:
An Evaluation Procedure for Comparing Clock Jitter Measurement Methods. 167-187 - Rebecca Young

, Luke Mather, Elisabeth Oswald
:
Comparing Key Rank Estimation Methods. 188-204 - Nils Wisiol

, Patrick Gersch
, Jean-Pierre Seifert:
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: A Case Study on Gaussian Sampling. 205-224
Attacking NTRU
- Zhuang Xu

, Owen Pemberton
, David F. Oswald
, Zhiming Zheng:
Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU. 227-247 - Luk Bettale, Julien Eynard

, Simon Montoya, Guénaël Renault
, Rémi Strullu:
Security Assessment of NTRU Against Non-Profiled SCA. 248-268
Next-Generation Cryptography
- Luk Bettale

, Marco De Oliveira, Emmanuelle Dottax
:
Post-Quantum Protocols for Banking Applications. 271-289 - Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert:

Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists. 290-308

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














