Skip to main content
  • Conference proceedings
  • © 2014

Constructive Side-Channel Analysis and Secure Design

5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8622)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): COSADE: International Workshop on Constructive Side-Channel Analysis and Secure Design

Conference proceedings info: COSADE 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

    Pages I-X
  2. A Note on the Use of Margins to Compare Distinguishers

    • Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
    Pages 1-8
  3. A Theoretical Study of Kolmogorov-Smirnov Distinguishers

    • Annelie Heuser, Olivier Rioul, Sylvain Guilley
    Pages 9-28
  4. Addition with Blinded Operands

    • Mohamed Karroumi, Benjamin Richard, Marc Joye
    Pages 41-55
  5. On Adaptive Bandwidth Selection for Efficient MIA

    • Mathieu Carbone, Sébastien Tiran, Sébastien Ordas, Michel Agoyan, Yannick Teglia, Gilles R. Ducharme et al.
    Pages 82-97
  6. Generic DPA Attacks: Curse or Blessing?

    • Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
    Pages 98-111
  7. Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions

    • Ludovic-Henri Gustin, François Durvaux, Stéphanie Kerckhof, François-Xavier Standaert, Michel Verleysen
    Pages 112-128
  8. Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3

    • Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Gilles Piret
    Pages 129-143
  9. Attacking Randomized Exponentiations Using Unsupervised Learning

    • Guilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine
    Pages 144-160
  10. On the Optimal Pre-processing for Non-profiling Differential Power Analysis

    • Suvadeep Hajra, Debdeep Mukhopadhyay
    Pages 161-178
  11. Template Attacks on Different Devices

    • Omar Choudary, Markus G. Kuhn
    Pages 179-198
  12. Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis

    • Yanis Linge, Cécile Dumas, Sophie Lambert-Lacroix
    Pages 199-213
  13. A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countermeasure

    • Sho Endo, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki
    Pages 214-228
  14. Adjusting Laser Injections for Fully Controlled Faults

    • Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria
    Pages 229-242
  15. ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research

    • Colin O’Flynn, Zhizhang (David) Chen
    Pages 243-260
  16. Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    • Mehari Msgna, Konstantinos Markantonakis, David Naccache, Keith Mayes
    Pages 261-280
  17. Studying Leakages on an Embedded Biometric System Using Side Channel Analysis

    • Maël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, Taoufik Chouta, Jean-Luc Danger et al.
    Pages 281-298

Other Volumes

  1. Constructive Side-Channel Analysis and Secure Design

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

Editors and Affiliations

  • FNISA, Paris, France

    Emmanuel Prouff

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access