default search action
COSADE 2012: Darmstadt, Germany
- Werner Schindler, Sorin A. Huss:
Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings. Lecture Notes in Computer Science 7275, Springer 2012, ISBN 978-3-642-29911-7
Practical Side-Channel Analysis
- Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Stefan Mangard:
Exploiting the Difference of Side-Channel Leakages. 1-16 - Thomas Korak, Thomas Plos, Michael Hutter:
Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario. 17-32
Invited Talk I
- Mathias Wagner:
700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy. 33-38
Secure Design
- Wei He, Eduardo de la Torre, Teresa Riesgo:
An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation. 39-53 - Shohreh Sharif Mansouri, Elena Dubrova:
An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers. 54-68 - Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala:
Conversion of Security Proofs from One Leakage Model to Another: A New Issue. 69-81
Side-Channel Attacks on RSA
- Sven Bauer:
Attacking Exponent Blinding in RSA without CRT. 82-88 - Jean DaRolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Ingrid Verbauwhede:
A New Scan Attack on RSA in Presence of Industrial Countermeasures. 89-104 - Camille Vuillaume, Takashi Endo, Paul Wooderson:
RSA Key Generation: New Attacks. 105-119
Fault Attacks
- Philipp Jovanovic, Martin Kreuzer, Ilia Polian:
A Fault Attack on the LED Block Cipher. 120-134 - Liang Zhao, Takashi Nishide, Kouichi Sakurai:
Differential Fault Analysis of Full LBlock. 135-150 - Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer, François Poucheret, Bruno Robisson, Philippe Maurine:
Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator. 151-166
Invited Talk II
- Viktor Fischer:
A Closer Look at Security in Random Number Generators Design. 167-182
Side-Channel Attacks on ECC
- Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst, David Naccache:
Same Values Power Analysis Using Special Points on Elliptic Curves. 183-198 - Alexander Krüger:
The Schindler-Itoh-attack in Case of Partial Information Leakage. 199-214
Different Methods in Side-Channel Analysis
- Michael Zohner, Michael Kasper, Marc Stöttinger:
Butterfly-Attack on Skein's Modular Addition. 215-230 - Xin-jie Zhao, Fan Zhang, Shize Guo, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji:
MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation. 231-248 - Annelie Heuser, Michael Zohner:
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines. 249-264
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.