default search action
COSADE 2014: Paris, France
- Emmanuel Prouff:
Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8622, Springer 2014, ISBN 978-3-319-10174-3 - Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede:
A Note on the Use of Margins to Compare Distinguishers. 1-8 - Annelie Heuser, Olivier Rioul, Sylvain Guilley:
A Theoretical Study of Kolmogorov-Smirnov Distinguishers - Side-Channel Analysis vs. Differential Cryptanalysis. 9-28 - Valentina Banciu, Elisabeth Oswald:
Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES. 29-40 - Mohamed Karroumi, Benjamin Richard, Marc Joye:
Addition with Blinded Operands. 41-55 - Christophe Giraud:
On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance. 56-68 - Alberto Battistello:
Common Points on Elliptic Curves: The Achilles' Heel of Fault Attack Countermeasures. 69-81 - Mathieu Carbone, Sébastien Tiran, Sébastien Ordas, Michel Agoyan, Yannick Teglia, Gilles R. Ducharme, Philippe Maurine:
On Adaptive Bandwidth Selection for Efficient MIA. 82-97 - Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede:
Generic DPA Attacks: Curse or Blessing? 98-111 - Ludovic-Henri Gustin, François Durvaux, Stéphanie Kerckhof, François-Xavier Standaert, Michel Verleysen:
Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions. 112-128 - Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Gilles Piret:
Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3. 129-143 - Guilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine:
Attacking Randomized Exponentiations Using Unsupervised Learning. 144-160 - Suvadeep Hajra, Debdeep Mukhopadhyay:
On the Optimal Pre-processing for Non-profiling Differential Power Analysis. 161-178 - Omar Choudary, Markus G. Kuhn:
Template Attacks on Different Devices. 179-198 - Yanis Linge, Cécile Dumas, Sophie Lambert-Lacroix:
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis. 199-213 - Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki:
A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure. 214-228 - Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria:
Adjusting Laser Injections for Fully Controlled Faults. 229-242 - Colin O'Flynn, Zhizhang (David) Chen:
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research. 243-260 - Mehari Msgna, Konstantinos Markantonakis, David Naccache, Keith Mayes:
Verifying Software Integrity in Embedded Systems: A Side Channel Approach. 261-280 - Maël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, Taoufik Chouta, Jean-Luc Danger, Mélanie Favre, Tarik Graba:
Studying Leakages on an Embedded Biometric System Using Side Channel Analysis. 281-298 - Sebastian Kutzner, Axel Poschmann:
On the Security of RSM - Presenting 5 First- and Second-Order Attacks. 299-312
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.