LEADER 04605nam 22008415 450 001 9910483520403321 005 20200630182529.0 010 $a3-319-10175-7 024 7 $a10.1007/978-3-319-10175-0 035 $a(CKB)3710000000227369 035 $a(SSID)ssj0001338672 035 $a(PQKBManifestationID)11898512 035 $a(PQKBTitleCode)TC0001338672 035 $a(PQKBWorkID)11338076 035 $a(PQKB)10818354 035 $a(DE-He213)978-3-319-10175-0 035 $a(MiAaPQ)EBC6287279 035 $a(MiAaPQ)EBC5586595 035 $a(Au-PeEL)EBL5586595 035 $a(OCoLC)889234321 035 $a(PPN)180626116 035 $a(EXLCZ)993710000000227369 100 $a20140814d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aConstructive Side-Channel Analysis and Secure Design $e5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers /$fedited by Emmanuel Prouff 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (X, 313 p. 110 illus.) 225 1 $aSecurity and Cryptology ;$v8622 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-10174-9 327 $aA note on the use of margins to compare distinguishers -- A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis -- Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES -- Addition with Blinded Operands -- On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance -- Common Points on Elliptic Curves: The Achille's Heel of Fault Attack Countermeasures -- On Adaptive Bandwidth Selection for Efficient MIA -- Generic DPA attacks: curse or blessing? -- Template Attacks on Different Devices -- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis -- A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box Conditions and a Countermeasure -- Adjusting laser injections for fully controlled faults. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure. 410 0$aSecurity and Cryptology ;$v8622 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer security 606 $aComputers and civilization 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 676 $a005.8 702 $aProuff$b Emmanuel$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483520403321 996 $aConstructive Side-Channel Analysis and Secure Design$93084064 997 $aUNINA