default search action
10th COSADE 2019: Darmstadt, Germany
- Ilia Polian, Marc Stöttinger:
Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings. Lecture Notes in Computer Science 11421, Springer 2019, ISBN 978-3-030-16349-5
Keynotes and Invited Talks
- Onur Mutlu:
RowHammer and Beyond. 3-12 - Sébastien Carré, Adrien Facon, Sylvain Guilley, Sofiane Takarabt, Alexander Schaub, Youssef Souissi:
Cache-Timing Attack Detection and Prevention - Application to Crypto Libs and PQC. 13-21
Side-Channel Attacks
- Melissa Azouaoui, Romain Poussier, François-Xavier Standaert:
Fast Side-Channel Security Evaluation of ECC Implementations - Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder. 25-42 - Lars Tebelmann, Michael Pehl, Vincent Immler:
Side-Channel Analysis of the TERO PUF. 43-60
Fault-Injection Attacks
- Keyvan Ramezanpour, Paul Ampadu, William Diehl:
FIMA: Fault Intensity Map Analysis. 63-79 - Michael Gruber, Bodo Selmke:
Differential Fault Attacks on KLEIN. 80-95
White-Box Attacks
- Mohamed Zeyad, Houssem Maghrebi, Davide Alessio, Boris Batteux:
Another Look on Bucketing Attack to Defeat White-Box Implementations. 99-117 - Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang:
Higher-Order DCA against Standard Side-Channel Countermeasures. 118-141
Side-Channel Analysis Methodologies
- Loïc Masure, Cécile Dumas, Emmanuel Prouff:
Gradient Visualization for General Characterization in Profiling Attacks. 145-167 - Liron David, Avishai Wool:
Fast Analytical Rank Estimation. 168-190
Security Aspects of Post-Quantum Schemes
- Juliane Krämer, Mirjam Loiero:
Fault Attacks on UOV and Rainbow. 193-214 - Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao:
Towards Optimized and Constant-Time CSIDH on Embedded Devices. 215-231 - Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
Number "Not Used" Once - Practical Fault Attack on pqm4 Implementations of NIST Candidates. 232-250
Countermeasures Against Implementation Attacks
- Thomas Schamberger, Oliver Mischke, Johanna Sepúlveda:
Practical Evaluation of Masking for NTRUEncrypt on ARM Cortex-M4. 253-269 - Felix Wegener, Christian Baiker, Amir Moradi:
Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak. 270-284 - Antoon Purnal, Victor Arribas, Lauren De Meyer:
Trade-offs in Protecting Keccak Against Combined Side-Channel and Fault Attacks. 285-302
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.