LEADER 03871nam 22007095 450 001 9910484597903321 005 20251225173511.0 010 $a3-030-68487-3 024 7 $a10.1007/978-3-030-68487-7 035 $a(CKB)4100000011743097 035 $a(DE-He213)978-3-030-68487-7 035 $a(MiAaPQ)EBC6465649 035 $a(PPN)253253160 035 $a(EXLCZ)994100000011743097 100 $a20210128d2021 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSmart Card Research and Advanced Applications $e19th International Conference, CARDIS 2020, Virtual Event, November 18?19, 2020, Revised Selected Papers /$fedited by Pierre-Yvan Liardet, Nele Mentens 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (X, 197 p. 51 illus., 30 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12609 300 $aIncludes index. 311 08$a3-030-68486-5 327 $aPost-Quantum Cryptography -- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime -- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers -- Classic McEliece Implementation with Low Memory Footprint -- Efficient Implementations -- A Fast and Compact RISC-V Accelerator for Ascon and Friends -- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE -- Secure and E cient Delegation of Pairings with Online Inputs -- Physical Attacks -- On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough -- A Power Side-Channel Attack on the CCA2-Secure HQC KEM -- How Deep Learning Helps Compromising USIM -- Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers -- Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices -- Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries. 330 $aThis book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12609 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputers, Special purpose 606 $aApplication software 606 $aComputer networks 606 $aCryptology 606 $aData and Information Security 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputers, Special purpose. 615 0$aApplication software. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 676 $a006 702 $aLiardet$b Pierre-Yvan 702 $aMentens$b Nele 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484597903321 996 $aSmart Card Research and Advanced Applications$93004629 997 $aUNINA