Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1387
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGuilley, Sylvain. ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:22Z-
dc.date.available2020-05-17T08:28:22Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319646473 ;en_US
dc.identifier.isbn3319646478 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1387-
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319646466 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools ;en_US
dc.description.statementofresponsibilityedited by Sylvain Guilleyen_US
dc.description.tableofcontentsDoes Coupling Affect the Security of Masked Implementations -- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks -- A Practical Security Evaluation on FPGA -- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors -- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA -- On the Construction of Side-Channel Attack Resilient S-boxes -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices -- Side-Channel Analysis of Keymill -- On the Easiness of Turning Higher-Order Leakages into First-Order -- Side-Channel Attacks against the Human Brain: The PIN Code Case Study -- Impacts of Technology Trends on Physical Attacks -- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks -- How Low Can We Go -- DFA on LS-Designs with a Practical Implementation on SCREAM -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors -- Getting the Most out of Leakage Detection -- Statistical Tools and Measurement Setups Hand in Hand -- Mind the Gap: Towards Secure 1st-Order Masking in Software ;en_US
dc.format.extent1 online resource (X, 299 p.) : ; 127 illus ;en_US
dc.publisherSpringer International Publishing,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10348 ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10348 ;en_US
dc.relation.haspart9783319646473.pdfen_US
dc.subjectComputer science ;en_US
dc.subjectMicroprogramming ;en_US
dc.subjectArchitecture, Computer ;en_US
dc.subjectComputer security ;en_US
dc.subjectData encryption (Computer science) ;en_US
dc.subjectComputer science ; Mathematics ;en_US
dc.subjectManagement information systems ;en_US
dc.subjectComputer Science ;en_US
dc.subjectSystems and Data Security ;en_US
dc.subjectData Encryptien_US
dc.titleConstructive Side-Channel Analysis and Secure Designen_US
dc.title.alternative8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319646473.pdf20.68 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGuilley, Sylvain. ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:22Z-
dc.date.available2020-05-17T08:28:22Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319646473 ;en_US
dc.identifier.isbn3319646478 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1387-
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319646466 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools ;en_US
dc.description.statementofresponsibilityedited by Sylvain Guilleyen_US
dc.description.tableofcontentsDoes Coupling Affect the Security of Masked Implementations -- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks -- A Practical Security Evaluation on FPGA -- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors -- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA -- On the Construction of Side-Channel Attack Resilient S-boxes -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices -- Side-Channel Analysis of Keymill -- On the Easiness of Turning Higher-Order Leakages into First-Order -- Side-Channel Attacks against the Human Brain: The PIN Code Case Study -- Impacts of Technology Trends on Physical Attacks -- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks -- How Low Can We Go -- DFA on LS-Designs with a Practical Implementation on SCREAM -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors -- Getting the Most out of Leakage Detection -- Statistical Tools and Measurement Setups Hand in Hand -- Mind the Gap: Towards Secure 1st-Order Masking in Software ;en_US
dc.format.extent1 online resource (X, 299 p.) : ; 127 illus ;en_US
dc.publisherSpringer International Publishing,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10348 ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10348 ;en_US
dc.relation.haspart9783319646473.pdfen_US
dc.subjectComputer science ;en_US
dc.subjectMicroprogramming ;en_US
dc.subjectArchitecture, Computer ;en_US
dc.subjectComputer security ;en_US
dc.subjectData encryption (Computer science) ;en_US
dc.subjectComputer science ; Mathematics ;en_US
dc.subjectManagement information systems ;en_US
dc.subjectComputer Science ;en_US
dc.subjectSystems and Data Security ;en_US
dc.subjectData Encryptien_US
dc.titleConstructive Side-Channel Analysis and Secure Designen_US
dc.title.alternative8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319646473.pdf20.68 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGuilley, Sylvain. ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:22Z-
dc.date.available2020-05-17T08:28:22Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319646473 ;en_US
dc.identifier.isbn3319646478 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1387-
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319646466 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools ;en_US
dc.description.statementofresponsibilityedited by Sylvain Guilleyen_US
dc.description.tableofcontentsDoes Coupling Affect the Security of Masked Implementations -- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks -- A Practical Security Evaluation on FPGA -- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors -- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA -- On the Construction of Side-Channel Attack Resilient S-boxes -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices -- Side-Channel Analysis of Keymill -- On the Easiness of Turning Higher-Order Leakages into First-Order -- Side-Channel Attacks against the Human Brain: The PIN Code Case Study -- Impacts of Technology Trends on Physical Attacks -- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks -- How Low Can We Go -- DFA on LS-Designs with a Practical Implementation on SCREAM -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors -- Getting the Most out of Leakage Detection -- Statistical Tools and Measurement Setups Hand in Hand -- Mind the Gap: Towards Secure 1st-Order Masking in Software ;en_US
dc.format.extent1 online resource (X, 299 p.) : ; 127 illus ;en_US
dc.publisherSpringer International Publishing,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10348 ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10348 ;en_US
dc.relation.haspart9783319646473.pdfen_US
dc.subjectComputer science ;en_US
dc.subjectMicroprogramming ;en_US
dc.subjectArchitecture, Computer ;en_US
dc.subjectComputer security ;en_US
dc.subjectData encryption (Computer science) ;en_US
dc.subjectComputer science ; Mathematics ;en_US
dc.subjectManagement information systems ;en_US
dc.subjectComputer Science ;en_US
dc.subjectSystems and Data Security ;en_US
dc.subjectData Encryptien_US
dc.titleConstructive Side-Channel Analysis and Secure Designen_US
dc.title.alternative8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319646473.pdf20.68 MBAdobe PDFThumbnail
Preview File