


default search action
12th COSADE 2021: Lugano, Switzerland
- Shivam Bhasin

, Fabrizio De Santis
:
Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, COSADE 2021, Lugano, Switzerland, October 25-27, 2021, Proceedings. Lecture Notes in Computer Science 12910, Springer 2021, ISBN 978-3-030-89914-1
Side-Channel Analysis
- Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi:

SideLine: How Delay-Lines (May) Leak Secrets from Your SoC. 3-30 - Yaacov Belenky

, Ira Dushar
, Valery Teper
, Hennadii Chernyshchyk
, Leonid Azriel
, Yury Kreimer
:
First Full-Fledged Side Channel Attack on HMAC-SHA-2. 31-52 - Guilherme Perin, Ileana Buhan, Stjepan Picek:

Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis. 53-81
Fault Attacks
- Sayandeep Saha, Debdeep Mukhopadhyay:

Transform Without Encode is not Sufficient for SIFA and FTA Security: A Case Study. 85-104 - Guillaume Barbu, Laurent Castelnovi, Thomas Chabrier:

Generalizing Statistical Ineffective Fault Attacks in the Spirit of Side-Channel Attacks. 105-125
Countermeasures
- Davide Poggi, Philippe Maurine, Thomas Ordas, Alexandre Sarafianos:

Protecting Secure ICs Against Side-Channel Attacks by Identifying and Quantifying Potential EM and Leakage Hotspots at Simulation Stage. 129-147 - Nicolai Müller

, Thorben Moos
, Amir Moradi
:
Low-Latency Hardware Masking of PRINCE. 148-167 - Balazs Udvarhelyi, Olivier Bronchain, François-Xavier Standaert:

Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP. 168-183 - Emmanuelle Dottax, Christophe Giraud

, Agathe Houzelot:
White-Box ECDSA: Challenges and Existing Solutions. 184-201
Post-quantum Cryptography
- Aurélien Greuet

, Simon Montoya, Guénaël Renault:
On Using RSA/ECC Coprocessor for Ideal Lattice-Based Key Exchange. 205-227 - Aymeric Genêt, Natacha Linard de Guertechin, Novak Kaluderovic:

Full Key Recovery Side-Channel Attack Against Ephemeral SIKE on the Cortex-M4. 228-254 - Élise Tasso, Luca De Feo, Nadia El Mrabet, Simon Pontié:

Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack. 255-276
Physical Unclonable Functions
- Lars Tebelmann

, Ulrich Kühne
, Jean-Luc Danger
, Michael Pehl
:
Analysis and Protection of the Two-Metric Helper Data Scheme. 279-302 - Trevor Kroeger, Wei Cheng

, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks. 303-321

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














