Cryptographic Hardware and Embedded Systems -- CHES 2014
Springer Berlin (Verlag)
978-3-662-44708-6 (ISBN)
Side-Channel Attacks.- EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor.- A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks.- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.- Good Is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory.- New Attacks and Constructions.- "Ooh Aah... Just a Little Bit" : A Small Amount of Side Channel Can Go a Long Way.- Destroying Fault Invariant with Randomization: A Countermeasure for AES against Differential Fault Attacks.- Reversing Stealthy Dopant-Level Circuits.- Constructing S-boxes for Lightweight Cryptography with FeistelStructure.- Countermeasures.- A Statistical Model for Higher Order DPA on Masked Devices.- Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures.- Secure Conversion between Boolean and Arithmetic Masking of Any Order.- Making RSA-PSS Provably Secure against Non-random Faults.- Algorithm Specific SCA.- Side-Channel Attack against RSA Key Generation Algorithms.- Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.- RSA Meets DPA: Recovering RSA Secret Keys from Noisy AnalogData.- Simple Power Analysis on AES Key Expansion Revisited.- ECC Implementations.- Efficient Pairings and ECC for Embedded Systems.- Curve41417: Karatsuba Revisited.- Implementations.- Cofactorization on Graphics Processing Units.- Enhanced Lattice-Based Signatures on Reconfigurable Hardware.- Compact Ring-LWE Cryptoprocessor.- Hardware Implementations of Symmetric Cryptosystems.- ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption.- FPGA Implementations of SPRING: And Their Countermeasures against Side-Channel Attacks.- FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison.- PUFs Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?.- Efficient Power and TimingSide Channels for Physical Unclonable Functions.- Physical Characterization of Arbiter PUFs.- Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM.- RNGs and SCA Issues in Hardware.- Embedded Evaluation of Randomness in Oscillator Based ElementaryTRNG.- Entropy Evaluation for Oscillator-Based True Random Number Generators.- Side-Channel Leakage through Static Power: Should We Care about in Practice.- Gate-Level Masking under a Path-Based Leakage Metric.- Early Propagation and Imbalanced Routing, How to Diminish inFPGAs.
Erscheint lt. Verlag | 22.9.2014 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 618 p. 192 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 942 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | embedded systems security • hardware attacks and countermeasures • hardware-oriented cryptographic designs and crypta • hardware-oriented cryptographic designs and cryptanalysis • physical unclonable functions • random number generators • Security and Privacy • security in hardware • side-channel analysis and countermeasures • tamper-resistant designs |
ISBN-10 | 3-662-44708-8 / 3662447088 |
ISBN-13 | 978-3-662-44708-6 / 9783662447086 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich