Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: cod="ro"
|
|
|
| Link zu diesem Datensatz | https://d-nb.info/1379531551 |
| Titel | Constructive Approaches for Security Analysis and Design of Embedded Systems : First International Conference, CASCADE 2025, Saint-Etienne, France, April 2–4, 2025, Proceedings / edited by Matthieu Rivain, Pascal Sasdrich |
| Person(en) |
Rivain, Matthieu (Herausgeber) Sasdrich, Pascal (Herausgeber) |
| Organisation(en) | SpringerLink (Online service) (Sonstige) |
| Ausgabe | 1st ed. 2026 |
| Verlag | Cham : Springer Nature Switzerland, Imprint: Springer |
| Zeitliche Einordnung | Erscheinungsdatum: 2026 |
| Umfang/Format | Online-Ressource, XI, 604 p. 198 illus., 153 illus. in color. : online resource. |
| Andere Ausgabe(n) |
Printed edition:: ISBN: 978-3-032-01404-7 Printed edition:: ISBN: 978-3-032-01406-1 |
| Inhalt | .-Attacks on Symmetric Cryptography. -- The Dangerous Message/Key Swap in HMAC. -- Practical Second-Order CPA Attack on Ascon with Proper Selection Function. -- Side-Channel Attacks. -- On the Success Rate of Simple Side-Channel Attacks against Masking with Unlimited Attack Traces. -- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY. -- Physical Security. -- Robust and Reliable PUF Protocol Exploiting Non-Monotonic Quantization and Neyman-Pearson Lemma. -- Towards Package Opening Detection at Power-up by Monitoring Thermal Dissipation. -- Partial Key Overwrite Attacks in Microcontrollers: a Survey. -- RISC-V. -- Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V. -- A Hardware Design Methodology to Prevent Microarchitectural Transition Leakages. -- Machine Learning. -- Taking AI-Based Side-Channel Attacks to a New Dimension. -- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis. -- Improving Leakage Exploitability in Horizontal Side Channel Attacks through Anomaly Mitigation with Unsupervised Neural Networks. -- Profiling Side-Channel Attack on HQC Polynomial Multiplication Using Machine Learning Methods. -- Attacks on Post-Quantum Cryptography. -- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM. -- A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS). -- Vladimir Sarde and Nicolas Debande. -- Message-Recovery Horizontal Correlation Attack on Classic McEliece. -- Breaking HuFu with 0 Leakage: A Side-Channel Analysis. -- Securing Post-Quantum Cryptography. -- X2X: Low-Randomness and High-Throughput A2B and B2A conversions for d+1 shares in Hardware. -- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum Digital Signatures and KEMs. -- Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms. -- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation. -- Homomorphic Encryption and White-Box Cryptography. -- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks. -- White-Box Implementation Techniques for the HFE Family. |
| Persistent Identifier |
URN: urn:nbn:de:101:1-2510220408045.277935617897 DOI: 10.1007/978-3-032-01405-4 |
| URL | https://doi.org/10.1007/978-3-032-01405-4 |
| ISBN/Einband/Preis | 978-3-032-01405-4 |
| Sprache(n) | Englisch (eng) |
| Beziehungen | Lecture Notes in Computer Science ; 15952 |
| DDC-Notation | 005.82 (maschinell ermittelte DDC-Kurznotation) |
| Sachgruppe(n) | 004 Informatik |
| Online-Zugriff | Archivobjekt öffnen |

