|
Showing 1 - 12 of
12 matches in All Departments
This book constitutes revised selected papers from the 7th
International Workshop on Constructive Side-Channel Analysis and
Secure Design, COSADE 2016, held in Graz, Austria, in April 2016.
The 12 papers presented in this volume were carefully reviewed and
selected from 32 submissions. They were organized in topical
sections named: security and physical attacks; side-channel
analysis (case studies); fault analysis; and side-channel analysis
(tools).
The two-volume proceedings LNCS 9056 + 9057 constitutes the
proceedings of the 34th Annual International Conference on the
Theory and Applications of Cryptographic Techniques, EUROCRYPT
2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers
included in these volumes were carefully reviewed and selected from
194 submissions. The papers are organized in topical sections
named: honorable mentions, random number generators, number field
sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash
functions, evaluation implementation, masking, fully homomorphic
encryption, related-key attacks, fully monomorphic encryption,
efficient two-party protocols, symmetric cryptanalysis, lattices,
signatures, zero-knowledge proofs, leakage-resilient cryptography,
garbled circuits, crypto currencies, secret sharing, outsourcing
computations, obfuscation and e-voting, multi-party computations,
encryption, resistant protocols, key exchange, quantum
cryptography, and discrete logarithms.
The two-volume proceedings LNCS 9056 + 9057 constitutes the
proceedings of the 34th Annual International Conference on the
Theory and Applications of Cryptographic Techniques, EUROCRYPT
2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers
included in these volumes were carefully reviewed and selected from
194 submissions. The papers are organized in topical sections
named: honorable mentions, random number generators, number field
sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash
functions, evaluation implementation, masking, fully homomorphic
encryption, related-key attacks, fully monomorphic encryption,
efficient two-party protocols, symmetric cryptanalysis, lattices,
signatures, zero-knowledge proofs, leakage-resilient cryptography,
garbled circuits, crypto currencies, secret sharing, outsourcing
computations, obfuscation and e-voting, multi-party computations,
encryption, resistant protocols, key exchange, quantum
cryptography, and discrete logarithms.
This book constitutes the proceedings of the 33rd Annual
International Conference on the Theory and Applications of
Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen,
Denmark, in May 2014. The 38 full papers included in this volume
were carefully reviewed and selected from 197 submissions. They
deal with public key cryptanalysis, identity-based encryption, key
derivation and quantum computing, secret-key analysis and
implementations, obfuscation and multi linear maps, authenticated
encryption, symmetric encryption, multi-party encryption,
side-channel attacks, signatures and public-key encryption,
functional encryption, foundations and multi-party computation.
Power analysis attacks allow the extraction of secret
information from smart cards. Smart cards are used in many
applications including banking, mobile communications, pay TV, and
electronic signatures. In all these applications, the security of
the smart cards is of crucial importance.
Power Analysis Attacks: Revealing the Secrets of Smart Cards is
the first comprehensive treatment of power analysis attacks and
countermeasures. Based on the principle that the only way to defend
against power analysis attacks is to understand them, this book
explains how power analysis attacks work. Using many examples, it
discusses simple and differential power analysis as well as
advanced techniques like template attacks. Furthermore, the authors
provide an extensive discussion of countermeasures like shuffling,
masking, and DPA-resistant logic styles. By analyzing the pros and
cons of the different countermeasures, this volume allows
practitioners to decide how to protect smart cards.
Power analysis attacks allow the extraction of secret
information from smart cards. Smart cards are used in many
applications including banking, mobile communications, pay TV, and
electronic signatures. In all these applications, the security of
the smart cards is of crucial importance.
Power Analysis Attacks: Revealing the Secrets of Smart Cards is
the first comprehensive treatment of power analysis attacks and
countermeasures. Based on the principle that the only way to defend
against power analysis attacks is to understand them, this book
explains how power analysis attacks work. Using many examples, it
discusses simple and differential power analysis as well as
advanced techniques like template attacks. Furthermore, this volume
provides an extensive discussion of countermeasures like shuffling,
masking, and DPA-resistant logic styles.
By analyzing the pros and cons of the different countermeasures,
Power Analysis Attacks: Revealing the Secrets of Smart Cards allows
practitioners to decide how to protect smart cards. This book also
provides valuable information for advanced-level students, and
researchers working in information security.
This book constitutes the refereed proceedings of the 21st
International Conference on Cryptology in India, INDOCRYPT 2020,
held in Bangalore, India, in December 2020.The 39 full papers
presented together with 3 invited abstracts in this book were
carefully reviewed and selected from 84 submissions. Apart from its
traditional focus on areas in applied and theoretical cryptology,
this year INDOCRYPT solicited papers in the area of Formal Methods
for Cryptographic Systems as well and much more.
|
|