


default search action
8th COSADE 2017: Paris, France
- Sylvain Guilley:

Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10348, Springer 2017, ISBN 978-3-319-64646-6 - Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova

, Vincent Rijmen
:
Does Coupling Affect the Security of Masked Implementations? 1-18 - Kashif Nawaz

, Dina Kamel, François-Xavier Standaert
, Denis Flandre
:
Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study. 19-33 - Florian Unterstein

, Johann Heyszl, Fabrizio De Santis, Robert Specht
:
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA. 34-49 - Rei Ueno, Naofumi Homma, Takafumi Aoki:

Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation. 50-64 - Jeremy Dubeuf, David Hély

, Vincent Beroulle:
Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors. 65-82 - Maik Ender

, Alexander Wild, Amir Moradi
:
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA. 83-101 - Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch:

On the Construction of Side-Channel Attack Resilient S-boxes. 102-119 - Yoo-Seung Won, Dong-Guk Han:

Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices. 120-137 - Christoph Dobraunig

, Maria Eichlseder
, Thomas Korak, Florian Mendel
:
Side-Channel Analysis of Keymill. 138-152 - Thorben Moos

, Amir Moradi
:
On the Easiness of Turning Higher-Order Leakages into First-Order. 153-170 - Joseph Lange, Clément Massart, André Mouraux

, François-Xavier Standaert
:
Side-Channel Attacks Against the Human Brain: The PIN Code Case Study. 171-189 - Philippe Maurine, Sylvain Guilley:

Impacts of Technology Trends on Physical Attacks? 190-206 - Oscar M. Guillen, Michael Gruber

, Fabrizio De Santis:
Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go? 207-222 - Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey

:
DFA on LS-Designs with a Practical Implementation on SCREAM. 223-247 - Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki:

Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors. 248-263 - Santos Merino Del Pozo

, François-Xavier Standaert
:
Getting the Most Out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand. 264-281 - Kostas Papagiannopoulos, Nikita Veshchikov:

Mind the Gap: Towards Secure 1st-Order Masking in Software. 282-297

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














