Smart Card Research and Advanced Applications: 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papers

Author:   Thomas Eisenbarth ,  Yannick Teglia
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2018
Volume:   10728
ISBN:  

9783319752075


Pages:   249
Publication Date:   26 January 2018
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Smart Card Research and Advanced Applications: 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papers


Add your own review!

Overview

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, held in Lugano, Switzerland, in November 2017.The 14 revised full papers presented together with 2 abstracts of invited talks in this book were carefully reviewed and selected from 48 submissions.  CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.

Full Product Details

Author:   Thomas Eisenbarth ,  Yannick Teglia
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2018
Volume:   10728
Weight:   0.454kg
ISBN:  

9783319752075


ISBN 10:   3319752073
Pages:   249
Publication Date:   26 January 2018
Audience:   College/higher education ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.- Optimal First-Order Boolean Masking for Embedded IoT Devices.- A first-order chosen plaintext DPA attack on the third round of DES.- A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks.- A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.- Leakage Bounds for Gaussian Side Channels.- Towards Sound and Optimal Leakage Detection Procedure.- Connecting and Improving Direct Sum Masking and Inner Product Masking.- May The Force Be With You: Force-Based Relay Attack Detection.- Instruction Duplication: Leaky and Not Too Fault-Tolerant!.- An EM Fault Injection Susceptibility Criterion and its application to the localization of hotspots.- Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers.- Horizontal clustering side-channel attacks on embedded ECC implementations.- Trace Augmentation: What Can Be Done Even Before Preprocessing in a Pro led SCA?

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List