Security, Privacy, and Applied Cryptography Engineering
Title | Security, Privacy, and Applied Cryptography Engineering PDF eBook |
Author | Rajat Subhra Chakraborty |
Publisher | Springer |
Pages | 390 |
Release | 2015-09-24 |
Genre | Computers |
ISBN | 3319241265 |
This book constitutes the refereed proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length. The papers are devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.
Fault Analysis in Cryptography
Title | Fault Analysis in Cryptography PDF eBook |
Author | Marc Joye |
Publisher | Springer Science & Business Media |
Pages | 352 |
Release | 2012-06-21 |
Genre | Computers |
ISBN | 3642296564 |
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks. Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board. This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.
Automated Methods in Cryptographic Fault Analysis
Title | Automated Methods in Cryptographic Fault Analysis PDF eBook |
Author | Jakub Breier |
Publisher | Springer |
Pages | 342 |
Release | 2019-03-19 |
Genre | Technology & Engineering |
ISBN | 3030113337 |
This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products.
Information Security and Cryptology - ICISC 2010
Title | Information Security and Cryptology - ICISC 2010 PDF eBook |
Author | Kyung-Hyune Rhee |
Publisher | Springer |
Pages | 447 |
Release | 2011-08-30 |
Genre | Computers |
ISBN | 364224209X |
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.
Cryptographic Hardware and Embedded Systems -- CHES 2014
Title | Cryptographic Hardware and Embedded Systems -- CHES 2014 PDF eBook |
Author | Lejla Batina |
Publisher | Springer |
Pages | 631 |
Release | 2014-09-12 |
Genre | Computers |
ISBN | 3662447096 |
This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.
Smart Card Research and Advanced Applications
Title | Smart Card Research and Advanced Applications PDF eBook |
Author | Emmanuel Prouff |
Publisher | Springer Science & Business Media |
Pages | 346 |
Release | 2011-12-12 |
Genre | Business & Economics |
ISBN | 3642272568 |
This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security.
Security, Privacy, and Applied Cryptography Engineering
Title | Security, Privacy, and Applied Cryptography Engineering PDF eBook |
Author | Anupam Chattopadhyay |
Publisher | Springer |
Pages | 248 |
Release | 2018-12-06 |
Genre | Computers |
ISBN | 3030050726 |
This book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018. The 12 full papers presented were carefully reviewed and selected from 34 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.