Limit search to available items
Book Cover
E-book
Author COSADE (Workshop) (11th : 2020 : Online)

Title Constructive side-channel analysis and secure design : 11th International Workshop, COSADE 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers / Guido Marco Bertoni, Francesco Regazzoni (eds.)
Published Cham : Springer, 2021

Copies

Description 1 online resource (341 pages)
Series Lecture Notes in Computer Science ; 12244
LNCS sublibrary: SL 4, security and cryptology
Lecture notes in computer science ; 12244.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro -- Preface -- Organization -- Contents -- Fault and Side Channel Attacks -- Persistent Fault Analysis with Few Encryptions -- 1 Introduction -- 1.1 Zhang et al.'s Attack -- 1.2 Contributions -- 1.3 Outline -- 2 Bias Cancelling Effect of MixColumns -- 3 Improvement Using Maximum Likelihood -- 3.1 Optimal Distinguisher -- 3.2 Key Byte Ranking -- 3.3 Combination of Several Key Bytes to Reconstruct the Full Key -- 3.4 Efficiencies of Key Byte Rank and Combination Algorithms -- 3.5 Comparison with the Tool of Veyrat-Charvillon et al. ch1DBLP:confspseurocryptspsVeyratspsCharvillonGS13
4 Conclusion and Perspectives -- 4.1 Conclusion -- 4.2 Perspectives -- 4.3 Note Added After Revision of the Accepted Paper -- References -- A Template Attack to Reconstruct the Input of SHA-3 on an 8-Bit Device -- 1 Introduction -- 2 Preliminaries and Notation -- 2.1 Keccak-f[1600] and SHA-3 -- 2.2 Template Attack -- 2.3 Combining Multiple Likelihood Tables -- 3 Attack Strategy -- 4 Template Attack on SHA-3 -- 4.1 Target Hardware Device and Measurement Setup -- 4.2 Interesting Clock Cycle Detection -- 4.3 Building Templates -- 4.4 Evaluating the Quality of Templates
5 Searching the Correct Intermediate States -- 5.1 Layer 1: Generating Tables for Byte Rows -- 5.2 Layer 2: Generating Tables for Byte Slices -- 5.3 Layer 3: Consistency Checking -- 5.4 Results -- 6 Discussion and Conclusion -- References -- Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes -- 1 Introduction -- 2 Preliminaries and Related Works -- 2.1 Basic Notation -- 2.2 Authenticated Encryptions Based on Polynomial Hash Function -- 2.3 The Problem of Unforgeability -- 2.4 Conventional SCAs on Polynomial Hash Function -- 3 Proposed Attack on ChaCha20-Poly1305
3.1 Attack Description -- 3.2 Side-Channel Analysis on Final Addition -- 3.3 Exhaustive Polynomial Factorization -- 3.4 Feasibility Evaluation -- 3.5 Application to Open-Source Poly1305 Implementation -- 4 Discussion -- 4.1 Noise Tolerance -- 4.2 Applicability and Generality of the Proposed Attack -- 4.3 Countermeasures -- 5 Conclusion -- References -- Side-Channel Analysis Methodologies -- Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis -- 1 Introduction -- 2 Problem Statement -- 3 Time-Frequency Analysis with the Wavelet Scattering Transform
3.1 Some Time-Frequency Representations -- 3.2 The Wavelet Scattering Transform -- 4 A Combination Procedure for Ensemble Methods in SCA -- 5 Experiments -- 5.1 Method Used -- 5.2 Datasets -- 5.3 Choosing the Parameters -- 5.4 Results -- 5.5 Visualizing Leakages -- 6 Conclusion -- References -- Scatter: a Missing Case? -- 1 Introduction -- 2 Background -- 2.1 Scatter Transform with Chi2/MIA Distinguishers -- 2.2 On-the-Fly Linear Regression -- 2.3 Selection of Parameters -- 3 First-Order Experiments -- 3.1 Setting #1: A Simulated Shuffled Implementation
Summary This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, held in Lugano, Switzerland, in April 2020. Due to COVID-19, the workshop was held online. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. The workshop covers subjects from wide ranges such as secure design, side channel attacks and countermeasures, and architectures and protocols
Notes "However, the physical version of the conference had to be canceled due to COVID-19, and the conference was turned into a virtual event."--Preface
3.2 Setting #2: A Concrete Jittery Implementation
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed March 16, 2021)
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer networks -- Security measures
Computer organization
Computer security
Data encryption (Computer science)
Software engineering
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Bertoni, Guido Marco
Regazzoni, Francesco
ISBN 9783030687731
3030687732
Other Titles COSADE 2020