Constructive Approaches for Security Analysis and Design of Embedded Systems: First International Conference, CASCADE 2025, Saint-Etienne, France, April 2–4, 2025, Proceedings

Author:   Matthieu Rivain ,  Pascal Sasdrich
Publisher:   Springer Nature Switzerland AG
ISBN:  

9783032014047


Pages:   604
Publication Date:   21 October 2025
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $211.17 Quantity:  
Add to Cart

Share |

Constructive Approaches for Security Analysis and Design of Embedded Systems: First International Conference, CASCADE 2025, Saint-Etienne, France, April 2–4, 2025, Proceedings


Overview

This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025. The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks;  Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.

Full Product Details

Author:   Matthieu Rivain ,  Pascal Sasdrich
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
ISBN:  

9783032014047


ISBN 10:   3032014042
Pages:   604
Publication Date:   21 October 2025
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.-Attacks on Symmetric Cryptography. .- The Dangerous Message/Key Swap in HMAC. .- Practical Second-Order CPA Attack on Ascon with Proper Selection Function. .- Side-Channel Attacks. .- On the Success Rate of Simple Side-Channel Attacks against Masking with Unlimited Attack Traces. .- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.  .- Physical Security. .- Robust and Reliable PUF Protocol Exploiting Non-Monotonic Quantization and Neyman-Pearson Lemma. .- Towards Package Opening Detection at Power-up by Monitoring Thermal Dissipation. .- Partial Key Overwrite Attacks in Microcontrollers: a Survey. .- RISC-V. .- Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V. .- A Hardware Design Methodology to Prevent Microarchitectural Transition Leakages. .- Machine Learning. .- Taking AI-Based Side-Channel Attacks to a New Dimension. .- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis. .- Improving Leakage Exploitability in Horizontal Side Channel Attacks through Anomaly Mitigation with Unsupervised Neural Networks. .- Profiling Side-Channel Attack on HQC Polynomial Multiplication Using Machine Learning Methods. .- Attacks on Post-Quantum Cryptography. .- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM. .- A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS). .- Vladimir Sarde and Nicolas Debande. .- Message-Recovery Horizontal Correlation Attack on Classic McEliece. .- Breaking HuFu with 0 Leakage: A Side-Channel Analysis. .- Securing Post-Quantum Cryptography. .- X2X: Low-Randomness and High-Throughput A2B and B2A conversions for d+1 shares in Hardware. .- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum Digital Signatures and KEMs. .- Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms. .- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation. .- Homomorphic Encryption and White-Box Cryptography. .- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks. .- White-Box Implementation Techniques for the HFE Family. 

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

OCT_RG_2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List