This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, held in Lugano, Switzerland, in November 2017. The 14 revised full papers presented together with 2 abstracts of invited talks in this book were carefully reviewed and selected from 48 submissions. CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, held in Lugano, Switzerland, in November 2017.
The 14 revised full papers presented together with 2 abstracts of invited talks in this book were carefully reviewed and selected from 48 submissions.
CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.- Optimal First-Order Boolean Masking for Embedded IoT Devices.- A first-order chosen plaintext DPA attack on the third round of DES.- A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks.- A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.- Leakage Bounds for Gaussian Side Channels.- Towards Sound and Optimal Leakage Detection Procedure.- Connecting and Improving Direct Sum Masking and Inner Product Masking.- May The Force Be With You: Force-Based Relay Attack Detection.- Instruction Duplication: Leaky and Not Too Fault-Tolerant!.- An EM Fault Injection Susceptibility Criterion and its application to the localization of hotspots.- Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers.- Horizontal clustering side-channel attacks on embedded ECC implementations.- Trace Augmentation: What Can Be Done Even Before Preprocessing in a Pro led SCA?
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.- Optimal First-Order Boolean Masking for Embedded IoT Devices.- A first-order chosen plaintext DPA attack on the third round of DES.- A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks.- A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.- Leakage Bounds for Gaussian Side Channels.- Towards Sound and Optimal Leakage Detection Procedure.- Connecting and Improving Direct Sum Masking and Inner Product Masking.- May The Force Be With You: Force-Based Relay Attack Detection.- Instruction Duplication: Leaky and Not Too Fault-Tolerant!.- An EM Fault Injection Susceptibility Criterion and its application to the localization of hotspots.- Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers.- Horizontal clustering side-channel attacks on embedded ECC implementations.- Trace Augmentation: What Can Be Done Even Before Preprocessing in a Pro led SCA?
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497