This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.
This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.
Post-Quantum Cryptography.- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime.- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers.- Classic McEliece Implementation with Low Memory Footprint.- Efficient Implementations.- A Fast and Compact RISC-V Accelerator for Ascon and Friends.- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE.- Secure and E cient Delegation of Pairings with Online Inputs.- Physical Attacks.- On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough.- A Power Side-Channel Attack on the CCA2-Secure HQC KEM.- How Deep Learning Helps Compromising USIM.- Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.- Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices.- Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
Post-Quantum Cryptography.- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime.- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers.- Classic McEliece Implementation with Low Memory Footprint.- Efficient Implementations.- A Fast and Compact RISC-V Accelerator for Ascon and Friends.- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE.- Secure and E cient Delegation of Pairings with Online Inputs.- Physical Attacks.- On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough.- A Power Side-Channel Attack on the CCA2-Secure HQC KEM.- How Deep Learning Helps Compromising USIM.- Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.- Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices.- Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497