Constructive Side-Channel Analysis and Secure Design

Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings

  • Werner Schindler
  • Sorin A. Huss
Conference proceedings COSADE 2012

DOI: 10.1007/978-3-642-29912-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7275)

Table of contents (18 papers)

  1. Front Matter
  2. Practical Side-Channel Analysis

    1. Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Stefan Mangard
      Pages 1-16
    2. Thomas Korak, Thomas Plos, Michael Hutter
      Pages 17-32
  3. Invited Talk I

  4. Secure Design

    1. Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala
      Pages 69-81
  5. Side-Channel Attacks on RSA

    1. Jean Da Rolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Ingrid Verbauwhede
      Pages 89-104
    2. Camille Vuillaume, Takashi Endo, Paul Wooderson
      Pages 105-119
  6. Fault Attacks

    1. Philipp Jovanovic, Martin Kreuzer, Ilia Polian
      Pages 120-134
    2. Liang Zhao, Takashi Nishide, Kouichi Sakurai
      Pages 135-150
    3. Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer, François Poucheret, Bruno Robisson et al.
      Pages 151-166
  7. Invited Talk II

  8. Side-Channel Attacks on ECC

    1. Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst, David Naccache
      Pages 183-198
  9. Different Methods in Side-Channel Analysis

    1. Michael Zohner, Michael Kasper, Marc Stöttinger
      Pages 215-230
    2. Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang, Zhijie Shi, Huiying Liu et al.
      Pages 231-248
    3. Annelie Heuser, Michael Zohner
      Pages 249-264
  10. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, held in Darmstadt, Germany, May 2012. The 16 revised full papers presented together with two invited talks were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on practical side-channel analysis; secure design; side-channel attacks on RSA; fault attacks; side-channel attacks on ECC; different methods in side-channel analysis.

Keywords

RFID cryptographic hardware elliptic curve cryptosystem public-key cryptography smart card

Editors and affiliations

  • Werner Schindler
    • 1
  • Sorin A. Huss
    • 2
  1. 1.Bundesamt für Sicherheit in der Informationstechnik (BSI)BonnGermany
  2. 2.Department of Computer Science, Integrated Circuits and Systems LabTechnische Universität DarmstadtDarmstadtGermany

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-29911-7
  • Online ISBN 978-3-642-29912-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349