Smart Card Research and Advanced Applications : 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers / / edited by Sonia Belaïd, Tim Güneysu
| Smart Card Research and Advanced Applications : 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers / / edited by Sonia Belaïd, Tim Güneysu |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (X, 269 p. 106 illus., 50 illus. in color.) |
| Disciplina |
005.82
006.246 |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Data protection Application software Computer networks Microprogramming Cryptology Data and Information Security Computer and Information Systems Applications Computer Communication Networks Control Structures and Microprogramming |
| ISBN | 3-030-42068-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | System-on-a-Chip Security -- In-situ Extraction of Randomness from Computer Architecture through Hardware Performance Counters -- Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Latency and Low-Energy Applications -- Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance -- Post-Quantum Cryptography -- Improving Speed of Dilithium's Signing Procedure -- An efficient and provable masked implementation of qtesla -- Side-Channel Analysis -- Side-channel attacks on blinded scalar multiplications revisited -- Remote Side-Channel Attacks on Heterogeneous SoC -- Optimal Collision Side-Channel Attacks -- Microarchitectural Attacks -- A Bit-Level Approach to Side Channel Based Disassembling -- CCCiCC: A Cross-core Cache-independent Covert Channel on AMD Family 15h CPUs -- Design Considerations for EM Pulse Fault Injection -- Cryptographic Primitives -- Lightweight MACs from Universal Hash Functions -- FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms -- Advances in Side-Channel Analysis -- A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis -- Key Enumeration from the Adversarial Viewpoint. When to Stop Measuring and Start Enumerating?. |
| Record Nr. | UNINA-9910410056003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Smart Card Research and Advanced Applications [[electronic resource] ] : 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers / / edited by Begül Bilgin, Jean-Bernard Fischer
| Smart Card Research and Advanced Applications [[electronic resource] ] : 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers / / edited by Begül Bilgin, Jean-Bernard Fischer |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (X, 201 p. 135 illus., 59 illus. in color.) |
| Disciplina | 006.246 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Computer security Cryptology Systems and Data Security |
| ISBN | 3-030-15462-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Convolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations -- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES -- Improving Side-channel Analysis through Semi-supervised Learning -- Non-profiled Mask Recovery: the impact of Independent Component Analysis -- How (not) to Use Welch’s T-test in Side-Channel Security Evaluations -- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys -- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M -- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication -- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs -- Electromagnetic Activity vs. Logical Activity : Near Field Scans for Reverse Engineering -- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P -- Breaking all the Things — A Systematic Survey of Firmware Extraction Techniques for IoT Devices -- Exploiting JCVM on smart cards using forged references in the API calls. |
| Record Nr. | UNISA-996466441403316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers / / edited by Begül Bilgin, Jean-Bernard Fischer
| Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers / / edited by Begül Bilgin, Jean-Bernard Fischer |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (X, 201 p. 135 illus., 59 illus. in color.) |
| Disciplina | 006.246 |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Data protection Cryptology Data and Information Security |
| ISBN | 3-030-15462-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Convolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations -- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES -- Improving Side-channel Analysis through Semi-supervised Learning -- Non-profiled Mask Recovery: the impact of Independent Component Analysis -- How (not) to Use Welch’s T-test in Side-Channel Security Evaluations -- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys -- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M -- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication -- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs -- Electromagnetic Activity vs. Logical Activity : Near Field Scans for Reverse Engineering -- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P -- Breaking all the Things — A Systematic Survey of Firmware Extraction Techniques for IoT Devices -- Exploiting JCVM on smart cards using forged references in the API calls. |
| Record Nr. | UNINA-9910337572803321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||