This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2 4, 2025.
The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.
Inhaltsverzeichnis
. -Attacks on Symmetric Cryptography.
. - The Dangerous Message/Key Swap in HMAC.
. - Practical Second-Order CPA Attack on Ascon with Proper Selection
Function.
. - Side-Channel Attacks.
. - On the Success Rate of Simple Side-Channel Attacks against Masking
with Unlimited Attack Traces.
. - A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.
. - Physical Security.
. - Robust and Reliable PUF Protocol Exploiting Non-Monotonic
Quantization and Neyman-Pearson Lemma.
. - Towards Package Opening Detection at Power-up by Monitoring
Thermal Dissipation.
. - Partial Key Overwrite Attacks in Microcontrollers: a Survey.
. - RISC-V.
. - Combined Masking and Shuffling for Side-Channel Secure Ascon on
RISC-V.
. - A Hardware Design Methodology to Prevent Microarchitectural
Transition Leakages.
. - Machine Learning.
. - Taking AI-Based Side-Channel Attacks to a New Dimension.
. - Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for
Deep Learning-based Side-Channel Analysis.
. - Improving Leakage Exploitability in Horizontal Side Channel Attacks
through Anomaly Mitigation with Unsupervised Neural Networks.
. - Profiling Side-Channel Attack on HQC Polynomial Multiplication
Using Machine Learning Methods.
. - Attacks on Post-Quantum Cryptography.
. - Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM.
. - A Horizontal Attack on the Codes and Restricted Objects Signature
Scheme (CROSS).
. - Vladimir Sarde and Nicolas Debande.
. - Message-Recovery Horizontal Correlation Attack on Classic McEliece.
. - Breaking HuFu with 0 Leakage: A Side-Channel Analysis.
. - Securing Post-Quantum Cryptography.
. - X2X: Low-Randomness and High-Throughput A2B and B2A
conversions for d+1 shares in Hardware.
. - Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum
Digital Signatures and KEMs.
. - Efficient Error Detection Methods for the Number Theoretic Transforms
in Lattice-Based Algorithms.
. - A Fault-Resistant NTT by Polynomial Evaluation and Interpolation.
. - Homomorphic Encryption and White-Box Cryptography.
. - Hybrid Homomorphic Encryption Resistance to Side-channel Attacks.
. - White-Box Implementation Techniques for the HFE Family.
Es wurden noch keine Bewertungen abgegeben. Schreiben Sie die erste Bewertung zu "Constructive Approaches for Security Analysis and Design of Embedded Systems" und helfen Sie damit anderen bei der Kaufentscheidung.