


default search action
COSADE 2015: Berlin, Germany
- Stefan Mangard, Axel Y. Poschmann:

Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9064, Springer 2015, ISBN 978-3-319-21475-7
Side-Channel Attacks
- Robert Specht

, Johann Heyszl, Martin Kleinsteuber, Georg Sigl:
Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements. 3-19 - Liran Lerman, Romain Poussier, Gianluca Bontempi

, Olivier Markowitch, François-Xavier Standaert
:
Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis). 20-33 - François Durvaux, François-Xavier Standaert

, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville:
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits. 34-50 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:

Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks. 51-63 - Takeshi Sugawara

, Daisuke Suzuki, Minoru Saeki:
Two Operands of Multipliers in Side-Channel Attack. 64-78
FPGA Countermeasures
- Alexander Wild, Amir Moradi

, Tim Güneysu
:
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. 81-94 - Pascal Sasdrich

, Oliver Mischke, Amir Moradi
, Tim Güneysu
:
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. 95-107
Timing Attacks and Countermeasures
- Berk Gülmezoglu, Mehmet Sinan Inci, Gorka Irazoqui Apecechea, Thomas Eisenbarth

, Berk Sunar:
A Faster and More Realistic Flush+Reload Attack on AES. 111-126 - Billy Bob Brumley

:
Faster Software for Fast Endomorphisms. 127-140 - Mariya Georgieva, Frédéric de Portzamparc:

Toward Secure Implementation of McEliece Decryption. 141-156
Fault Attacks
- Stjepan Picek, Lejla Batina, Pieter Buzing, Domagoj Jakobovic

:
Fault Injection with a New Flavor: Memetic Algorithms Make a Difference. 159-173 - Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont

:
Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers. 174-188 - Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen, Debdeep Mukhopadhyay:

A Biased Fault Attack on the Time Redundancy Countermeasure for AES. 189-203
Countermeasures
- Praveen Kumar Vadnala, Johann Großschädl:

Faster Mask Conversion with Lookup Tables. 207-221 - Michael Muehlberghuber, Thomas Korak, Philipp Dunst, Michael Hutter:

Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC. 222-236
Hands-on Side-Channel Analysis
- Amir Moradi

, Gesine Hinterwälder:
Side-Channel Security Analysis of Ultra-Low-Power FRAM-Based MCUs. 239-254 - Gabriel Goller, Georg Sigl:

Side Channel Attacks on Smartphones and Embedded Devices Using Standard Radio Equipment. 255-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














