default search action
16th CARDIS 2017: Lugano, Switzerland
- Thomas Eisenbarth, Yannick Teglia:
Smart Card Research and Advanced Applications - 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10728, Springer 2018, ISBN 978-3-319-75207-5 - Omer Shwartz, Yael Mathov, Michael Bohadana, Yuval Elovici, Yossi Oren:
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices. 1-21 - Alex Biryukov, Daniel Dinu, Yann Le Corre, Aleksei Udovenko:
Optimal First-Order Boolean Masking for Embedded IoT Devices. 22-41 - Oscar Reparaz, Benedikt Gierlichs:
A First-Order Chosen-Plaintext DPA Attack on the Third Round of DES. 42-50 - Yang Li, Shuang Wang, Zhibin Wang, Jian Wang:
A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks. 51-69 - Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. 70-87 - Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank K. Gürkaynak, Michael Muehlberghuber:
Leakage Bounds for Gaussian Side Channels. 88-104 - A. Adam Ding, Liwei Zhang, François Durvaux, François-Xavier Standaert, Yunsi Fei:
Towards Sound and Optimal Leakage Detection Procedure. 105-122 - Romain Poussier, Qian Guo, François-Xavier Standaert, Claude Carlet, Sylvain Guilley:
Connecting and Improving Direct Sum Masking and Inner Product Masking. 123-141 - Iakovos Gurulian, Gerhard P. Hancke, Konstantinos Markantonakis, Raja Naeem Akram:
May the Force Be with You: Force-Based Relay Attack Detection. 142-159 - Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers:
Instruction Duplication: Leaky and Not Too Fault-Tolerant! 160-179 - Maxime Madau, Michel Agoyan, Philippe Maurine:
An EM Fault Injection Susceptibility Criterion and Its Application to the Localization of Hotspots. 180-195 - Arthur Beckers, Benedikt Gierlichs, Ingrid Verbauwhede:
Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers. 196-212 - Erick Nascimento, Lukasz Chmielewski:
Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations. 213-231 - Sihang Pu, Yu Yu, Weijia Wang, Zheng Guo, Junrong Liu, Dawu Gu, Lingyun Wang, Jie Gan:
Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA? 232-247
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.