Description |
1 online resource (341 pages) |
Series |
Lecture Notes in Computer Science ; 12244 |
|
LNCS sublibrary: SL 4, security and cryptology |
|
Lecture notes in computer science ; 12244.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro -- Preface -- Organization -- Contents -- Fault and Side Channel Attacks -- Persistent Fault Analysis with Few Encryptions -- 1 Introduction -- 1.1 Zhang et al.'s Attack -- 1.2 Contributions -- 1.3 Outline -- 2 Bias Cancelling Effect of MixColumns -- 3 Improvement Using Maximum Likelihood -- 3.1 Optimal Distinguisher -- 3.2 Key Byte Ranking -- 3.3 Combination of Several Key Bytes to Reconstruct the Full Key -- 3.4 Efficiencies of Key Byte Rank and Combination Algorithms -- 3.5 Comparison with the Tool of Veyrat-Charvillon et al. ch1DBLP:confspseurocryptspsVeyratspsCharvillonGS13 |
|
4 Conclusion and Perspectives -- 4.1 Conclusion -- 4.2 Perspectives -- 4.3 Note Added After Revision of the Accepted Paper -- References -- A Template Attack to Reconstruct the Input of SHA-3 on an 8-Bit Device -- 1 Introduction -- 2 Preliminaries and Notation -- 2.1 Keccak-f[1600] and SHA-3 -- 2.2 Template Attack -- 2.3 Combining Multiple Likelihood Tables -- 3 Attack Strategy -- 4 Template Attack on SHA-3 -- 4.1 Target Hardware Device and Measurement Setup -- 4.2 Interesting Clock Cycle Detection -- 4.3 Building Templates -- 4.4 Evaluating the Quality of Templates |
|
5 Searching the Correct Intermediate States -- 5.1 Layer 1: Generating Tables for Byte Rows -- 5.2 Layer 2: Generating Tables for Byte Slices -- 5.3 Layer 3: Consistency Checking -- 5.4 Results -- 6 Discussion and Conclusion -- References -- Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes -- 1 Introduction -- 2 Preliminaries and Related Works -- 2.1 Basic Notation -- 2.2 Authenticated Encryptions Based on Polynomial Hash Function -- 2.3 The Problem of Unforgeability -- 2.4 Conventional SCAs on Polynomial Hash Function -- 3 Proposed Attack on ChaCha20-Poly1305 |
|
3.1 Attack Description -- 3.2 Side-Channel Analysis on Final Addition -- 3.3 Exhaustive Polynomial Factorization -- 3.4 Feasibility Evaluation -- 3.5 Application to Open-Source Poly1305 Implementation -- 4 Discussion -- 4.1 Noise Tolerance -- 4.2 Applicability and Generality of the Proposed Attack -- 4.3 Countermeasures -- 5 Conclusion -- References -- Side-Channel Analysis Methodologies -- Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis -- 1 Introduction -- 2 Problem Statement -- 3 Time-Frequency Analysis with the Wavelet Scattering Transform |
|
3.1 Some Time-Frequency Representations -- 3.2 The Wavelet Scattering Transform -- 4 A Combination Procedure for Ensemble Methods in SCA -- 5 Experiments -- 5.1 Method Used -- 5.2 Datasets -- 5.3 Choosing the Parameters -- 5.4 Results -- 5.5 Visualizing Leakages -- 6 Conclusion -- References -- Scatter: a Missing Case? -- 1 Introduction -- 2 Background -- 2.1 Scatter Transform with Chi2/MIA Distinguishers -- 2.2 On-the-Fly Linear Regression -- 2.3 Selection of Parameters -- 3 First-Order Experiments -- 3.1 Setting #1: A Simulated Shuffled Implementation |
Summary |
This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, held in Lugano, Switzerland, in April 2020. Due to COVID-19, the workshop was held online. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. The workshop covers subjects from wide ranges such as secure design, side channel attacks and countermeasures, and architectures and protocols |
Notes |
"However, the physical version of the conference had to be canceled due to COVID-19, and the conference was turned into a virtual event."--Preface |
|
3.2 Setting #2: A Concrete Jittery Implementation |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed March 16, 2021) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Computer networks -- Security measures
|
|
Computer organization
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Software engineering
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Bertoni, Guido Marco
|
|
Regazzoni, Francesco
|
ISBN |
9783030687731 |
|
3030687732 |
|