


default search action
COSADE 2012: Darmstadt, Germany
- Werner Schindler, Sorin A. Huss:

Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings. Lecture Notes in Computer Science 7275, Springer 2012, ISBN 978-3-642-29911-7
Practical Side-Channel Analysis
- Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Stefan Mangard:

Exploiting the Difference of Side-Channel Leakages. 1-16 - Thomas Korak, Thomas Plos, Michael Hutter:

Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario. 17-32
Invited Talk I
- Mathias Wagner:

700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy. 33-38
Secure Design
- Wei He, Eduardo de la Torre, Teresa Riesgo:

An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation. 39-53 - Shohreh Sharif Mansouri, Elena Dubrova:

An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers. 54-68 - Jean-Sébastien Coron, Christophe Giraud

, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala:
Conversion of Security Proofs from One Leakage Model to Another: A New Issue. 69-81
Side-Channel Attacks on RSA
- Sven Bauer

:
Attacking Exponent Blinding in RSA without CRT. 82-88 - Jean DaRolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Ingrid Verbauwhede

:
A New Scan Attack on RSA in Presence of Industrial Countermeasures. 89-104 - Camille Vuillaume, Takashi Endo, Paul Wooderson

:
RSA Key Generation: New Attacks. 105-119
Fault Attacks
- Philipp Jovanovic, Martin Kreuzer

, Ilia Polian:
A Fault Attack on the LED Block Cipher. 120-134 - Liang Zhao, Takashi Nishide, Kouichi Sakurai:

Differential Fault Analysis of Full LBlock. 135-150 - Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer, François Poucheret, Bruno Robisson

, Philippe Maurine:
Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator. 151-166
Invited Talk II
- Viktor Fischer:

A Closer Look at Security in Random Number Generators Design. 167-182
Side-Channel Attacks on ECC
- Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst, David Naccache:

Same Values Power Analysis Using Special Points on Elliptic Curves. 183-198 - Alexander Krüger:

The Schindler-Itoh-attack in Case of Partial Information Leakage. 199-214
Different Methods in Side-Channel Analysis
- Michael Zohner, Michael Kasper, Marc Stöttinger

:
Butterfly-Attack on Skein's Modular Addition. 215-230 - Xin-jie Zhao, Fan Zhang, Shize Guo, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji:

MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation. 231-248 - Annelie Heuser, Michael Zohner:

Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines. 249-264

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














