04406nam 22007455 450 991084759840332120240403125738.03-031-57543-110.1007/978-3-031-57543-3(MiAaPQ)EBC31247242(Au-PeEL)EBL31247242(CKB)31326220000041(DE-He213)978-3-031-57543-3(EXLCZ)993132622000004120240329d2024 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierConstructive Side-Channel Analysis and Secure Design[electronic resource] 15th International Workshop, COSADE 2024, Gardanne, France, April 9–10, 2024, Proceedings /by Romain Wacquez ; edited by Naofumi Homma1st ed. 2024.Cham :Springer Nature Switzerland :Imprint: Springer,2024.1 online resource (285 pages)Lecture Notes in Computer Science,1611-3349 ;145953-031-57542-3 Analyses and Tools -- Characterizing and Modeling Synchronous Clock-Glitch Fault Injection -- On-chip evaluation of voltage drops and fault occurrence induced by Si backside EM injection -- EFFLUX-F2: A high performance hardware security evaluation board -- Attack Methods -- Practical Improvements to Statistical Ineffective Fault Attacks -- CAPABARA: A Combined Attack on CAPA -- Deep-Learning-Based Side-Channel Attacks -- Exploring Multi-Task Learning in the Context of Masked AES Implementations -- The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression -- Towards Private Deep Learning-Based Side-Channel Analysis using Homomorphic Encryption -- PUF/RNG -- Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF -- Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators -- Lightweight Leakage-Resilient PRNG from TBCs using Superposition -- Cryptographic Implementations -- The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+ -- HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme -- Combining Loop Shuffling and Code Polymorphism for Enhanced AES Side-Channel Security.This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024, held in Gardanne, France, during April 9–10, 2024. The 14 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Analyses and Tools; Attack Methods; Deep-Learning-Based Side-Channel Attacks; PUF/RNG; and Cryptographic Implementations.Lecture Notes in Computer Science,1611-3349 ;14595Data protectionComputersLaw and legislationInformation technologyLaw and legislationComputer networksComputers, Special purposeComputer systemsMicroprogrammingData and Information SecurityLegal Aspects of ComputingComputer Communication NetworksSpecial Purpose and Application-Based SystemsComputer System ImplementationControl Structures and MicroprogrammingData protection.ComputersLaw and legislation.Information technologyLaw and legislation.Computer networks.Computers, Special purpose.Computer systems.Microprogramming.Data and Information Security.Legal Aspects of Computing.Computer Communication Networks.Special Purpose and Application-Based Systems.Computer System Implementation.Control Structures and Microprogramming.005.8Homma Naofumi1736464Wacquez Romain1736465MiAaPQMiAaPQMiAaPQBOOK9910847598403321Constructive Side-Channel Analysis and Secure Design4156311UNINA