Smart Card Research and Advanced Applications: 16th International Conference, Cardis 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected » książka
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.- Optimal First-Order Boolean Masking for Embedded IoT Devices.- A first-order chosen plaintext DPA attack on the third round of DES.- A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks.- A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.- Leakage Bounds for Gaussian Side Channels.- Towards Sound and Optimal Leakage Detection Procedure.- Connecting and Improving Direct Sum Masking and Inner Product Masking.- May The Force Be With You: Force-Based Relay Attack Detection.- Instruction Duplication: Leaky and Not Too Fault-Tolerant!.- An EM Fault Injection Susceptibility Criterion and its application to the localization of hotspots.- Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers.- Horizontal clustering side-channel attacks on embedded ECC implementations.- Trace Augmentation: What Can Be Done Even Before Preprocessing in a Pro led SCA?