Muutke küpsiste eelistusi

E-raamat: Constructive Side-Channel Analysis and Secure Design: 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings

Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 74,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022.

The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The papers cover the following subjects: implementation attacks, secure implementation, implementation attack-resilient architectures and schemes, secure design and evaluation, practical attacks, test platforms, and open benchmarks.

Machine/Deep Learning.-  Machine-Learning assisted Side-Channel Attacks
on RNS ECC Implementations using Hybrid Feature Engineering.- Focus is Key to
Success: A Focal Loss Function for Deep Learning-based Side-channel
Analysis.-On the Evaluation of Deep Learning-based Side-channel Analysis.-
Tools & References A Second Look at the ASCAD Databases.- FIPAC: Thwarting
Fault- and Software-Induced Control-Flow Attacks with ARM Pointer
Authentication.-Body Biasing Injection: To thin or not to thin the
substrate?.- Attacks On the susceptibility of Texas Instruments SimpleLink
platform microcontrollers to non-invasive physical attacks.- Single-trace
clustering power analysis of the point-swapping procedure in the three point
ladder of Cortex-M4 SIKE.- Canonical DPA attack on HMAC-SHA1/SHA2.- Masking
Provable Secure Software Masking in the Real-World.- Systematic Study of
Decryption and Re-Encryption Leakage: the Case of Kyber.- Handcrafting:
Improving Automated Masking in Hardware with Manual Optimizations.