


default search action
21st CARDIS 2022: Birmingham, UK
- Ileana Buhan
, Tobias Schneider
:
Smart Card Research and Advanced Applications - 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13820, Springer 2023, ISBN 978-3-031-25318-8
Physical Attacks
- Nimish Mishra
, Anirban Chakraborty
, Urbi Chatterjee
, Debdeep Mukhopadhyay
:
Time's a Thief of Memory - Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels. 3-24 - Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin:
Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing. 25-44 - Raphaël Joud, Pierre-Alain Moëllic, Simon Pontié, Jean-Baptiste Rigaud
:
A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters. 45-65
Physical Countermeasures
- Loïc Masure
, Olivier Rioul
, François-Xavier Standaert
:
A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations. 69-81 - Yaoan Jin
, Atsuko Miyaji
:
Short-Iteration Constant-Time GCD and Modular Inversion. 82-99
Protecting AES
- Amund Askeland, Siemen Dhooghe
, Svetla Nikova, Vincent Rijmen
, Zhenda Zhang
:
Guarding the First Order: The Rise of AES Maskings. 103-122 - Luan Cardoso dos Santos, François Gérard, Johann Großschädl, Lorenzo Spignoli:
Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES. 123-145 - Mateus Simoes, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno:
Self-timed Masking: Implementing Masked S-Boxes Without Registers. 146-164
Evaluation Methodologies
- Arturo Mollinedo Garay
, Florent Bernard
, Viktor Fischer
, Patrick Haddad
, Ugo Mureddu
:
An Evaluation Procedure for Comparing Clock Jitter Measurement Methods. 167-187 - Rebecca Young
, Luke Mather, Elisabeth Oswald
:
Comparing Key Rank Estimation Methods. 188-204 - Nils Wisiol
, Patrick Gersch
, Jean-Pierre Seifert:
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: A Case Study on Gaussian Sampling. 205-224
Attacking NTRU
- Zhuang Xu
, Owen Pemberton
, David F. Oswald
, Zhiming Zheng:
Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU. 227-247 - Luk Bettale, Julien Eynard
, Simon Montoya, Guénaël Renault
, Rémi Strullu:
Security Assessment of NTRU Against Non-Profiled SCA. 248-268
Next-Generation Cryptography
- Luk Bettale
, Marco De Oliveira, Emmanuelle Dottax
:
Post-Quantum Protocols for Banking Applications. 271-289 - Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert:
Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists. 290-308

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.