03871nam 22007095 450 991048459790332120251225173511.03-030-68487-310.1007/978-3-030-68487-7(CKB)4100000011743097(DE-He213)978-3-030-68487-7(MiAaPQ)EBC6465649(PPN)253253160(EXLCZ)99410000001174309720210128d2021 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierSmart Card Research and Advanced Applications 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers /edited by Pierre-Yvan Liardet, Nele Mentens1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (X, 197 p. 51 illus., 30 illus. in color.)Security and Cryptology,2946-1863 ;12609Includes index.3-030-68486-5 Post-Quantum Cryptography -- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime -- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers -- Classic McEliece Implementation with Low Memory Footprint -- Efficient Implementations -- A Fast and Compact RISC-V Accelerator for Ascon and Friends -- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE -- Secure and E cient Delegation of Pairings with Online Inputs -- Physical Attacks -- On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough -- A Power Side-Channel Attack on the CCA2-Secure HQC KEM -- How Deep Learning Helps Compromising USIM -- Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers -- Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices -- Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.Security and Cryptology,2946-1863 ;12609CryptographyData encryption (Computer science)Data protectionComputers, Special purposeApplication softwareComputer networksCryptologyData and Information SecuritySpecial Purpose and Application-Based SystemsComputer and Information Systems ApplicationsComputer Communication NetworksCryptography.Data encryption (Computer science).Data protection.Computers, Special purpose.Application software.Computer networks.Cryptology.Data and Information Security.Special Purpose and Application-Based Systems.Computer and Information Systems Applications.Computer Communication Networks.006Liardet Pierre-YvanMentens NeleMiAaPQMiAaPQMiAaPQBOOK9910484597903321Smart Card Research and Advanced Applications3004629UNINA