TY - GEN
AU - Batina, Lejla
AU - Robshaw, Matthew
TI - Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings
PB - Springer
SN - 9783662447093
KW - Computer science
KW - Software engineering
KW - Computer Science
KW - Data protection
KW - Data encryption (Computer science)
KW - Cryptography.
KW - Computers, Special purpose.
KW - Konferenzschrift 2014 Pusan
KW - Konferenzschrift
KW - Eingebettetes System
KW - Hardwareentwurf
KW - Kryptologie
PY - 2014
N2 - Literaturangaben
N2 - Side-Channel AttacksEM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor -- A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks -- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks -- Good Is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory -- New Attacks and Constructions -- “Ooh Aah.. Just a Little Bit” : A Small Amount of Side Channel Can Go a Long Way -- Destroying Fault Invariant with Randomization: A Countermeasure for AES against Differential Fault Attacks -- Reversing Stealthy Dopant-Level Circuits -- Constructing S-boxes for Lightweight Cryptography with Feistel Structure -- Countermeasures -- A Statistical Model for Higher Order DPA on Masked Devices -- Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures -- Secure Conversion between Boolean and Arithmetic Masking of Any Order -- Making RSA-PSS Provably Secure against Non-random Faults -- Algorithm Specific SCA -- Side-Channel Attack against RSA Key Generation Algorithms -- Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs -- RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data -- Simple Power Analysis on AES Key Expansion Revisited -- ECC Implementations -- Efficient Pairings and ECC for Embedded Systems -- Curve41417: Karatsuba Revisited -- Implementations -- Cofactorization on Graphics Processing Units -- Enhanced Lattice-Based Signatures on Reconfigurable Hardware -- Compact Ring-LWE Cryptoprocessor -- Hardware Implementations of Symmetric Cryptosystems -- ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption -- FPGA Implementations of SPRING: And Their Countermeasures against Side-Channel Attacks -- FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison -- PUFs Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? -- Efficient Power and Timing Side Channels for Physical Unclonable Functions -- Physical Characterization of Arbiter PUFs -- Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM -- RNGs and SCA Issues in Hardware -- Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG -- Entropy Evaluation for Oscillator-Based True Random Number Generators -- Side-Channel Leakage through Static Power: Should We Care about in Practice -- Gate-Level Masking under a Path-Based Leakage Metric -- Early Propagation and Imbalanced Routing, How to Diminish in FPGAs.
BT - Lecture Notes in Computer Science ; 8731
BT - SpringerLink ; Bücher
CY - Berlin, Heidelberg
UR - http://slubdd.de/katalog?TN_libero_mab2
ER -
Download citation