![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
8th COSADE 2017: Paris, France
- Sylvain Guilley:
Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10348, Springer 2017, ISBN 978-3-319-64646-6 - Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova
, Vincent Rijmen
:
Does Coupling Affect the Security of Masked Implementations? 1-18 - Kashif Nawaz
, Dina Kamel, François-Xavier Standaert
, Denis Flandre
:
Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study. 19-33 - Florian Unterstein
, Johann Heyszl, Fabrizio De Santis, Robert Specht
:
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA. 34-49 - Rei Ueno, Naofumi Homma, Takafumi Aoki:
Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation. 50-64 - Jeremy Dubeuf, David Hély
, Vincent Beroulle:
Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors. 65-82 - Maik Ender
, Alexander Wild, Amir Moradi
:
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA. 83-101 - Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch:
On the Construction of Side-Channel Attack Resilient S-boxes. 102-119 - Yoo-Seung Won, Dong-Guk Han:
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices. 120-137 - Christoph Dobraunig
, Maria Eichlseder
, Thomas Korak, Florian Mendel
:
Side-Channel Analysis of Keymill. 138-152 - Thorben Moos
, Amir Moradi
:
On the Easiness of Turning Higher-Order Leakages into First-Order. 153-170 - Joseph Lange, Clément Massart, André Mouraux
, François-Xavier Standaert
:
Side-Channel Attacks Against the Human Brain: The PIN Code Case Study. 171-189 - Philippe Maurine, Sylvain Guilley:
Impacts of Technology Trends on Physical Attacks? 190-206 - Oscar M. Guillen, Michael Gruber
, Fabrizio De Santis:
Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go? 207-222 - Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey
:
DFA on LS-Designs with a Practical Implementation on SCREAM. 223-247 - Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki:
Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors. 248-263 - Santos Merino Del Pozo
, François-Xavier Standaert
:
Getting the Most Out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand. 264-281 - Kostas Papagiannopoulos, Nikita Veshchikov:
Mind the Gap: Towards Secure 1st-Order Masking in Software. 282-297
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.