Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/autre/smart-card-research-and-advanced-applications/descriptif_3961387
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=3961387

Smart Card Research and Advanced Applications, 1st ed. 2018 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers Security and Cryptology Series

Langue : Anglais

Coordonnateurs : Eisenbarth Thomas, Teglia Yannick

Couverture de l’ouvrage Smart Card Research and Advanced Applications
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, held in Lugano, Switzerland, in November 2017.

The 14 revised full papers presented together with 2 abstracts of invited talks in this book were carefully reviewed and selected from 48 submissions. 

CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.

Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.- Optimal First-Order Boolean Masking for Embedded IoT Devices.- A first-order chosen plaintext DPA attack on the third round of DES.- A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks.- A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.- Leakage Bounds for Gaussian Side Channels.- Towards Sound and Optimal Leakage Detection Procedure.- Connecting and Improving Direct Sum Masking and Inner Product Masking.- May The Force Be With You: Force-Based Relay Attack Detection.- Instruction Duplication: Leaky and Not Too Fault-Tolerant!.- An EM Fault Injection Susceptibility Criterion and its application to the localization of hotspots.- Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers.- Horizontal clustering side-channel attacks on embedded ECC implementations.- Trace Augmentation: What Can Be Done Even Before Preprocessing in a Pro led SCA?

Date de parution :

Ouvrage de 249 p.

15.5x23.5 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

52,74 €

Ajouter au panier