Buch, Englisch, 604 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 920 g
First International Conference, CASCADE 2025, Saint-Etienne, France, April 2-4, 2025, Proceedings
Buch, Englisch, 604 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 920 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-032-01404-7
Verlag: Springer
This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025.
The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V
;
Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
.-Attacks on Symmetric Cryptography.
.- The Dangerous Message/Key Swap in HMAC.
.- Practical Second-Order CPA Attack on Ascon with Proper Selection
Function.
.- Side-Channel Attacks.
.- On the Success Rate of Simple Side-Channel Attacks against Masking
with Unlimited Attack Traces.
.- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.
.- Physical Security.
.- Robust and Reliable PUF Protocol Exploiting Non-Monotonic
Quantization and Neyman-Pearson Lemma.
.- Towards Package Opening Detection at Power-up by Monitoring
Thermal Dissipation.
.- Partial Key Overwrite Attacks in Microcontrollers: a Survey.
.- RISC-V.
.- Combined Masking and Shuffling for Side-Channel Secure Ascon on
RISC-V.
.- A Hardware Design Methodology to Prevent Microarchitectural
Transition Leakages.
.-
Machine Learning.
.- Taking AI-Based Side-Channel Attacks to a New Dimension.
.- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for
Deep Learning-based Side-Channel Analysis.
.- Improving Leakage Exploitability in Horizontal Side Channel Attacks
through Anomaly Mitigation with Unsupervised Neural Networks.
.- Profiling Side-Channel Attack on HQC Polynomial Multiplication
Using Machine Learning Methods.
.- Attacks on Post-Quantum Cryptography.
.- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM.
.- A Horizontal Attack on the Codes and Restricted Objects Signature
Scheme (CROSS).
.- Vladimir Sarde and Nicolas Debande.
.- Message-Recovery Horizontal Correlation Attack on Classic McEliece.
.- Breaking HuFu with 0 Leakage: A Side-Channel Analysis.
.- Securing Post-Quantum Cryptography.
.- X2X: Low-Randomness and High-Throughput A2B and B2A
conversions for d+1 shares in Hardware.
.- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum
Digital Signatures and KEMs.
.- Efficient Error Detection Methods for the Number Theoretic Transforms
in Lattice-Based Algorithms.
.- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation.
.- Homomorphic Encryption and White-Box Cryptography.
.- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks.
.- White-Box Implementation Techniques for the HFE Family.




