LEADER 06345nam 22008535 450 001 996465998803316 005 20200705224521.0 010 $a3-642-29912-1 024 7 $a10.1007/978-3-642-29912-4 035 $a(CKB)3360000000366034 035 $a(SSID)ssj0000666018 035 $a(PQKBManifestationID)11447245 035 $a(PQKBTitleCode)TC0000666018 035 $a(PQKBWorkID)10646674 035 $a(PQKB)11396819 035 $a(DE-He213)978-3-642-29912-4 035 $a(MiAaPQ)EBC3070073 035 $a(PPN)168315580 035 $a(EXLCZ)993360000000366034 100 $a20120419d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aConstructive Side-Channel Analysis and Secure Design$b[electronic resource] $eThird International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings /$fedited by Werner Schindler, Sorin Huss 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (280 p. 103 illus.) 225 1 $aSecurity and Cryptology ;$v7275 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-29911-3 320 $aIncludes bibliographical references and index. 327 $tExploiting the Difference of Side-Channel Leakages /$rMichael Hutter, Mario Kirschbaum, Thomas Plos, Jo?rn-Marc Schmidt and Stefan Mangard --$tAttacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario /$rThomas Korak, Thomas Plos and Michael Hutter --$t700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy /$rMathias Wagner --$tAn Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation /$rWei He, Eduardo de la Torre and Teresa Riesgo --$tAn Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers /$rShohreh Sharif Mansouri and Elena Dubrova --$tConversion of Security Proofs from One Leakage Model to Another: A New Issue /$rJean-Se?bastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner and Matthieu Rivain, et al. --$tAttacking Exponent Blinding in RSA without CRT /$rSven Bauer --$tA New Scan Attack on RSA in Presence of Industrial Countermeasures /$rJean Da Rolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes and Bruno Rouzeyre, et al. 327 $tRSA Key Generation: New Attacks /$rCamille Vuillaume, Takashi Endo and Paul Wooderson --$tA Fault Attack on the LED Block Cipher /$rPhilipp Jovanovic, Martin Kreuzer and Ilia Polian --$tDifferential Fault Analysis of Full LBlock /$rLiang Zhao, Takashi Nishide and Kouichi Sakurai --$tContactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator /$rPierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer and Franc?ois Poucheret, et al. --$tA Closer Look at Security in Random Number Generators Design /$rViktor Fischer --$tSame Values Power Analysis Using Special Points on Elliptic Curves /$rCe?dric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst and David Naccache --$tThe Schindler-Itoh-attack in Case of Partial Information Leakage /$rAlexander Kru?ger --$tButterfly-Attack on Skein's Modular Addition /$rMichael Zohner, Michael Kasper and Marc Sto?ttinger --$tMDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation /$rXinjie Zhao, Fan Zhang, Shize Guo, Tao Wang and Zhijie Shi, et al. --$tIntelligent Machine Homicide /$rBreaking Cryptographic Devices Using Support Vector Machines /$rAnnelie Heuser and Michael Zohner. 330 $aThis book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, held in Darmstadt, Germany, May 2012. The 16 revised full papers presented together with two invited talks were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on practical side-channel analysis; secure design; side-channel attacks on RSA; fault attacks; side-channel attacks on ECC; different methods in side-channel analysis. 410 0$aSecurity and Cryptology ;$v7275 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer security 606 $aComputers and civilization 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 608 $aKongress$zDarmstadt$y2012. 608 $aConference proceedings.$2fast 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 676 $a005.82 686 $aSS 4800$2rvk 702 $aSchindler$b Werner$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHuss$b Sorin$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aCOSADE 2012 906 $aBOOK 912 $a996465998803316 996 $aConstructive Side-Channel Analysis and Secure Design$91961252 997 $aUNISA