This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.
This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.
Post-Quantum Cryptography.- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime.- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers.- Classic McEliece Implementation with Low Memory Footprint.- Efficient Implementations.- A Fast and Compact RISC-V Accelerator for Ascon and Friends.- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE.- Secure and E cient Delegation of Pairings with Online Inputs.- Physical Attacks.- On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough.- A Power Side-Channel Attack on the CCA2-Secure HQC KEM.- How Deep Learning Helps Compromising USIM.- Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.- Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices.- Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
Post-Quantum Cryptography.- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime.- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers.- Classic McEliece Implementation with Low Memory Footprint.- Efficient Implementations.- A Fast and Compact RISC-V Accelerator for Ascon and Friends.- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE.- Secure and E cient Delegation of Pairings with Online Inputs.- Physical Attacks.- On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough.- A Power Side-Channel Attack on the CCA2-Secure HQC KEM.- How Deep Learning Helps Compromising USIM.- Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.- Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices.- Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309