Fault Tolerant Architectures for Cryptography and Hardware Security
Title | Fault Tolerant Architectures for Cryptography and Hardware Security PDF eBook |
Author | SIKHAR PATRANABIS |
Publisher | Springer |
Pages | 242 |
Release | 2018-03-29 |
Genre | Technology & Engineering |
ISBN | 981101387X |
This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.
Selected Areas in Cryptography – SAC 2016
Title | Selected Areas in Cryptography – SAC 2016 PDF eBook |
Author | Roberto Avanzi |
Publisher | Springer |
Pages | 582 |
Release | 2017-10-18 |
Genre | Computers |
ISBN | 3319694537 |
This book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John's, NL, Canada in August 2016. The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions. They are organized in the following topical sections: side channels and fault attacks; design and implementation of symmetric cryptography; efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives.
Foundations and Practice of Security
Title | Foundations and Practice of Security PDF eBook |
Author | Esma Aïmeur |
Publisher | Springer Nature |
Pages | 422 |
Release | 2022-06-14 |
Genre | Computers |
ISBN | 3031081471 |
This book constitutes the revised selected papers of the 14th International Symposium on Foundations and Practice of Security, FPS 2021, held in Paris, France, in December 2021. The 18 full papers and 9 short paper presented in this book were carefully reviewed and selected from 62 submissions. They cover a range of topics such as Analysis and Detection; Prevention and Efficiency; and Privacy by Design. Chapters “A Quantile-based Watermarking Approach for Distortion Minimization”, “Choosing Wordlists for Password Guessing: An Adaptive Multi-Armed Bandit Approach” and “A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Automated Methods in Cryptographic Fault Analysis
Title | Automated Methods in Cryptographic Fault Analysis PDF eBook |
Author | Jakub Breier |
Publisher | Springer |
Pages | 342 |
Release | 2019-03-19 |
Genre | Technology & Engineering |
ISBN | 3030113337 |
This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products.
Topics in Cryptology – CT-RSA 2024
Title | Topics in Cryptology – CT-RSA 2024 PDF eBook |
Author | Elisabeth Oswald |
Publisher | Springer Nature |
Pages | 490 |
Release | |
Genre | |
ISBN | 3031588681 |
Information Security and Cryptology - ICISC 2015
Title | Information Security and Cryptology - ICISC 2015 PDF eBook |
Author | Soonhak Kwon |
Publisher | Springer |
Pages | 375 |
Release | 2016-03-09 |
Genre | Computers |
ISBN | 3319308408 |
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security and Cryptology, ICISC 2015, held in Seoul, South Korea, in November 2015. The 23 revised full papers presented were carefully selected from 84 submissions during two rounds of reviewing and improvement. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are grouped around the following topics: digital signatures; public-key cryptography; block cipher cryptanalysis; elliptic curve cryptography; protocols; security; side-channel attacks.
ISTFA 2017: Proceedings from the 43rd International Symposium for Testing and Failure Analysis
Title | ISTFA 2017: Proceedings from the 43rd International Symposium for Testing and Failure Analysis PDF eBook |
Author | ASM International |
Publisher | ASM International |
Pages | 666 |
Release | 2017-12-01 |
Genre | Technology & Engineering |
ISBN | 1627081518 |
The theme for the November 2017 conference was Striving for 100% Success Rate. Papers focus on the tools and techniques needed for maximizing the success rate in every aspect of the electronic device failure analysis process.