Constructive Side-Channel Analysis and Secure Design 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings / [electronic resource] :
edited by Ilia Polian, Marc Stöttinger.
- 1st ed. 2019.
- X, 303 p. 230 illus., 64 illus. in color. online resource.
- Security and Cryptology, 11421 2946-1863 ; .
- Security and Cryptology, 11421 .
Side-Channel Attacks -- Fault-Injection Attacks -- White-Box Attacks -- Side-Channel Analysis Methodologies -- Security Aspects of Post-Quantum Schemes -- Countermeasures Against Implementation Attacks.
This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019. The 14 papers presented together with one keynote and one invited talk in this volume were carefully reviewed and selected from 34 submissions. They were organized in topical sections named: Side-Channel Attacks; Fault-Injection Attacks; White-Box Attacks; Side-Channel Analysis Methodologies; Security Aspects of Post-Quantum Schemes; and Countermeasures Against Implementation Attacks.
9783030163501
10.1007/978-3-030-16350-1 doi
Data protection.
Computer engineering.
Computer networks .
Microprogramming .
Coding theory.
Information theory.
Operating systems (Computers).
Data and Information Security.
Computer Engineering and Networks.
Control Structures and Microprogramming.
Coding and Information Theory.
Operating Systems.
QA76.9.A25
005.8
Side-Channel Attacks -- Fault-Injection Attacks -- White-Box Attacks -- Side-Channel Analysis Methodologies -- Security Aspects of Post-Quantum Schemes -- Countermeasures Against Implementation Attacks.
This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019. The 14 papers presented together with one keynote and one invited talk in this volume were carefully reviewed and selected from 34 submissions. They were organized in topical sections named: Side-Channel Attacks; Fault-Injection Attacks; White-Box Attacks; Side-Channel Analysis Methodologies; Security Aspects of Post-Quantum Schemes; and Countermeasures Against Implementation Attacks.
9783030163501
10.1007/978-3-030-16350-1 doi
Data protection.
Computer engineering.
Computer networks .
Microprogramming .
Coding theory.
Information theory.
Operating systems (Computers).
Data and Information Security.
Computer Engineering and Networks.
Control Structures and Microprogramming.
Coding and Information Theory.
Operating Systems.
QA76.9.A25
005.8