default search action
COSADE 2013: Paris, France
- Emmanuel Prouff:
Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers. Lecture Notes in Computer Science 7864, Springer 2013, ISBN 978-3-642-40025-4 - Juliane Krämer, Dmitry Nedospasov, Alexander Schlösser, Jean-Pierre Seifert:
Differential Photonic Emission Analysis. 1-16 - Amine Dehbaoui, Amir-Pasha Mirbaha, Nicolas Moro, Jean-Max Dutertre, Assia Tria:
Electromagnetic Glitch on the AES Round Counter. 17-31 - Benoit Feix, Alexandre Venelli:
Defeating with Fault Injection a Combined Attack Resistant Exponentiation. 32-45 - Diana Maimut, Cédric Murdica, David Naccache, Mehdi Tibouchi:
Fault Attacks on Projective-to-Affine Coordinates Conversion. 46-61 - Fan Zhang, Xinjie Zhao, Shize Guo, Tao Wang, Zhijie Shi:
Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers. 62-79 - Christophe Clavier, Benoit Feix:
Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis. 80-98 - Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang:
On 3-Share Threshold Implementations for 4-Bit S-boxes. 99-113 - Thomas Roche, Victor Lomné:
Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices. 114-136 - Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki, Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama:
Exploring the Relations between Fault Sensitivity and Power Consumption. 137-153 - Johannes Blömer, Peter Günther, Gennadij Liske:
Improved Side Channel Attacks on Pairing Based Cryptography. 154-168 - Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki:
Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure. 169-183 - Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cédric Meuter, Gianluca Bontempi, Olivier Markowitch:
Semi-Supervised Template Attack. 184-199 - Raphael Spreitzer, Thomas Plos:
Cache-Access Pattern Attack on Disaligned AES T-Tables. 200-214
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.