Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12910)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: COSADE 2021.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 14 full papers carefully reviewed and selected from 31 submissions are presented in this volume together with the 4 extended keynote abstracts. The workshop covers the following subjects: cryptography, side-channel analysis, cryptographic implementations, fault attacks, implementation attacks, post-quantum cryptography, hardware accelerators, etc.
Similar content being viewed by others
Keywords
- authentication
- computer crime
- computer hardware
- computer networks
- computer science
- computer security
- computer systems
- cryptography
- data security
- dos attacks
- encryption
- engineering
- internet
- network protocols
- network security
- public key cryptography
- side channel attack
- side-channel
- signal processing
- smart cards
Table of contents (14 papers)
-
Countermeasures
-
Physical Unclonable Functions
Other volumes
-
Constructive Side-Channel Analysis and Secure Design
Editors and Affiliations
Bibliographic Information
Book Title: Constructive Side-Channel Analysis and Secure Design
Book Subtitle: 12th International Workshop, COSADE 2021, Lugano, Switzerland, October 25–27, 2021, Proceedings
Editors: Shivam Bhasin, Fabrizio De Santis
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-89915-8
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2021
Softcover ISBN: 978-3-030-89914-1Published: 27 October 2021
eBook ISBN: 978-3-030-89915-8Published: 26 October 2021
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXVI, 323
Number of Illustrations: 25 b/w illustrations, 95 illustrations in colour
Topics: Systems and Data Security, Information Systems Applications (incl. Internet), Cryptology, Security Services, Mobile and Network Security, Computer Communication Networks