


default search action
15th COSADE 2024: Gardanne, France
- Romain Wacquez, Naofumi Homma:
Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Gardanne, France, April 9-10, 2024, Proceedings. Lecture Notes in Computer Science 14595, Springer 2024, ISBN 978-3-031-57542-6
Analyses and Tools
- Amélie Marotta, Ronan Lashermes, Guillaume Bouffard, Olivier Sentieys, Rachid Dafali:
Characterizing and Modeling Synchronous Clock-Glitch Fault Injection. 3-21 - Rikuu Hasegawa, Kazuki Monta, Takuya Wadatsumi, Takuji Miki, Makoto Nagata:
On-Chip Evaluation of Voltage Drops and Fault Occurrence Induced by Si Backside EM Injection. 22-37 - Arpan Jati
, Naina Gupta
, Anupam Chattopadhyay
, Somitra Kumar Sanadhya
:
EFFLUX-F2: A High Performance Hardware Security Evaluation Board. 38-56
Attack Methods
- Baris Ege
, Bob Swinkels
, Dilara Toprakhisar
, Praveen Kumar Vadnala
:
Practical Improvements to Statistical Ineffective Fault Attacks. 59-75 - Dilara Toprakhisar
, Svetla Nikova
, Ventzislav Nikov:
CAPABARA: A Combined Attack on CAPA. 76-89
Deep-learning-based Side-channel Attacks
- Thomas Marquet, Elisabeth Oswald
:
Exploring Multi-task Learning in the Context of Masked AES Implementations. 93-112 - Ioana Savu, Marina Krcek, Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for MORE: Unsupervised Side-Channel Analysis with Single Network Training and Multi-output Regression. 113-132 - Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger
, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations. 133-154
PUF/RNG
- Niklas Stein
, Michael Pehl
:
Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF. 157-176 - Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators. 177-196 - Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin:
Lightweight Leakage-Resilient PRNG from TBCs Using Superposition. 197-217
Cryptographic Implementations
- Patrick Karl
, Jonas Schupp
, Georg Sigl
:
The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+. 221-239 - Oussama Sayari, Soundes Marzougui, Thomas Aulbach, Juliane Krämer, Jean-Pierre Seifert:
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme. 240-259 - Nicolas Belleville, Loïc Masure:
Combining Loop Shuffling and Code PolyMorphism for Enhanced AES Side-Channel Security. 260-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.