|
|
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025. The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. Full Product DetailsAuthor: Matthieu Rivain , Pascal SasdrichPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG ISBN: 9783032014047ISBN 10: 3032014042 Pages: 604 Publication Date: 21 October 2025 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.-Attacks on Symmetric Cryptography. .- The Dangerous Message/Key Swap in HMAC. .- Practical Second-Order CPA Attack on Ascon with Proper Selection Function. .- Side-Channel Attacks. .- On the Success Rate of Simple Side-Channel Attacks against Masking with Unlimited Attack Traces. .- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY. .- Physical Security. .- Robust and Reliable PUF Protocol Exploiting Non-Monotonic Quantization and Neyman-Pearson Lemma. .- Towards Package Opening Detection at Power-up by Monitoring Thermal Dissipation. .- Partial Key Overwrite Attacks in Microcontrollers: a Survey. .- RISC-V. .- Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V. .- A Hardware Design Methodology to Prevent Microarchitectural Transition Leakages. .- Machine Learning. .- Taking AI-Based Side-Channel Attacks to a New Dimension. .- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis. .- Improving Leakage Exploitability in Horizontal Side Channel Attacks through Anomaly Mitigation with Unsupervised Neural Networks. .- Profiling Side-Channel Attack on HQC Polynomial Multiplication Using Machine Learning Methods. .- Attacks on Post-Quantum Cryptography. .- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM. .- A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS). .- Vladimir Sarde and Nicolas Debande. .- Message-Recovery Horizontal Correlation Attack on Classic McEliece. .- Breaking HuFu with 0 Leakage: A Side-Channel Analysis. .- Securing Post-Quantum Cryptography. .- X2X: Low-Randomness and High-Throughput A2B and B2A conversions for d+1 shares in Hardware. .- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum Digital Signatures and KEMs. .- Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms. .- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation. .- Homomorphic Encryption and White-Box Cryptography. .- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks. .- White-Box Implementation Techniques for the HFE Family.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||