default search action
21st CARDIS 2022: Birmingham, UK
- Ileana Buhan, Tobias Schneider:
Smart Card Research and Advanced Applications - 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13820, Springer 2023, ISBN 978-3-031-25318-8
Physical Attacks
- Nimish Mishra, Anirban Chakraborty, Urbi Chatterjee, Debdeep Mukhopadhyay:
Time's a Thief of Memory - Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels. 3-24 - Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin:
Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing. 25-44 - Raphaël Joud, Pierre-Alain Moëllic, Simon Pontié, Jean-Baptiste Rigaud:
A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters. 45-65
Physical Countermeasures
- Loïc Masure, Olivier Rioul, François-Xavier Standaert:
A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations. 69-81 - Yaoan Jin, Atsuko Miyaji:
Short-Iteration Constant-Time GCD and Modular Inversion. 82-99
Protecting AES
- Amund Askeland, Siemen Dhooghe, Svetla Nikova, Vincent Rijmen, Zhenda Zhang:
Guarding the First Order: The Rise of AES Maskings. 103-122 - Luan Cardoso dos Santos, François Gérard, Johann Großschädl, Lorenzo Spignoli:
Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES. 123-145 - Mateus Simoes, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno:
Self-timed Masking: Implementing Masked S-Boxes Without Registers. 146-164
Evaluation Methodologies
- Arturo Mollinedo Garay, Florent Bernard, Viktor Fischer, Patrick Haddad, Ugo Mureddu:
An Evaluation Procedure for Comparing Clock Jitter Measurement Methods. 167-187 - Rebecca Young, Luke Mather, Elisabeth Oswald:
Comparing Key Rank Estimation Methods. 188-204 - Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert:
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: A Case Study on Gaussian Sampling. 205-224
Attacking NTRU
- Zhuang Xu, Owen Pemberton, David F. Oswald, Zhiming Zheng:
Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU. 227-247 - Luk Bettale, Julien Eynard, Simon Montoya, Guénaël Renault, Rémi Strullu:
Security Assessment of NTRU Against Non-Profiled SCA. 248-268
Next-Generation Cryptography
- Luk Bettale, Marco De Oliveira, Emmanuelle Dottax:
Post-Quantum Protocols for Banking Applications. 271-289 - Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert:
Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists. 290-308
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.