03432nam 2200517 450 991068334490332120230730235824.03-031-29497-110.1007/978-3-031-29497-6(MiAaPQ)EBC7219068(Au-PeEL)EBL7219068(OCoLC)1373988360(DE-He213)978-3-031-29497-6(PPN)269092854(EXLCZ)992630946650004120230730d2023 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierConstructive side-channel analysis and secure design 14th international workshop, COSADE 2023, Munich, Germany, April 3-4, 2023, proceedings /edited by Elif Bilge Kavun and Michael Pehl1st ed. 2023.Cham, Switzerland :Springer Nature Switzerland AG,[2023]©20231 online resource (268 pages)Lecture Notes in Computer Science,1611-3349 ;13979Print version: Kavun, Elif Bilge Constructive Side-Channel Analysis and Secure Design Cham : Springer International Publishing AG,c2023 9783031294969 Includes bibliographical references and index.Fault-Injection Analyses and Countermeasures -- SAMVA: Static Analysis for Multi-Fault Attack Paths Determination -- Efficient attack-surface exploration for electromagnetic fault injection -- A CCFI verification scheme based on the RISC-V Trace Encoder -- Side-Channel Analyses and Countermeasures -- ASCA vs. SASCA - A closer look at the AES key schedule -- Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings -- Improving Side-channel Leakage Assessment using Pre-silicon Leakage Models -- Attacks on PQC and Countermeasures -- Fast First-Order Masked NTTRU -- On the Feasibility of Single-Trace Attacks on the CDT Gaussian Sampler in FrodoKEM -- Punctured Syndrome Decoding Problem: Efficient Side-Channel Attacks Against Classic McEliece -- Analyses and Tools -- Energy Consumption of Protected Cryptographic Hardware Cores - An Experimental Study -- Whiteboxgrind - Automated Analysis of Whitebox Cryptography -- White-box cryptography with global device binding from message recoverable signatures and token-based obfuscation.This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023, held in Munich, Germany, during April 3–4, 2023. The 12 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: fault-injection analyses and countermeasures; side-channel analyses and countermeasures; attacks on PQC and countermeasure; and analyses and tools.Lecture Notes in Computer Science,1611-3349 ;13979Computer securityCongressesData encryption (Computer science)CongressesComputer securityData encryption (Computer science)005.8Kavun Elif BilgePehl MichaelMiAaPQMiAaPQMiAaPQBOOK9910683344903321Constructive Side-Channel Analysis and Secure Design1961252UNINA