Normal view MARC view ISBD view

Smart Card Research and Advanced Applications [electronic resource] : 19th International Conference, CARDIS 2020, Virtual Event, November 18-19, 2020, Revised Selected Papers / edited by Pierre-Yvan Liardet, Nele Mentens.

Contributor(s): Liardet, Pierre-Yvan [editor.] | Mentens, Nele [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 12609Publisher: Cham : Springer International Publishing : Imprint: Springer, 2021Edition: 1st ed. 2021.Description: X, 197 p. 51 illus., 30 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030684877.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Computers, Special purpose | Application software | Computer networks  | Cryptology | Data and Information Security | Special Purpose and Application-Based Systems | Computer and Information Systems Applications | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
Post-Quantum Cryptography -- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime -- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers -- Classic McEliece Implementation with Low Memory Footprint -- Efficient Implementations -- A Fast and Compact RISC-V Accelerator for Ascon and Friends -- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE -- Secure and E cient Delegation of Pairings with Online Inputs -- Physical Attacks -- On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough -- A Power Side-Channel Attack on the CCA2-Secure HQC KEM -- How Deep Learning Helps Compromising USIM -- Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers -- Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices -- Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
In: Springer Nature eBookSummary: This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.
    average rating: 0.0 (0 votes)
No physical items for this record

Post-Quantum Cryptography -- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime -- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers -- Classic McEliece Implementation with Low Memory Footprint -- Efficient Implementations -- A Fast and Compact RISC-V Accelerator for Ascon and Friends -- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE -- Secure and E cient Delegation of Pairings with Online Inputs -- Physical Attacks -- On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough -- A Power Side-Channel Attack on the CCA2-Secure HQC KEM -- How Deep Learning Helps Compromising USIM -- Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers -- Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices -- Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.

This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.

There are no comments for this item.

Log in to your account to post a comment.