Smart Card Research and Advanced Applications
22nd International Conference, CARDIS 2023, Amsterdam, The Netherlands, November 14–16, 2023, Revised Selected Papers
Book and Conference Proceedings
22nd International Conference, CARDIS 2023, Amsterdam, The Netherlands, November 14–16, 2023, Revised Selected Papers
Article
Over the past few years, numerous large-scale disasters have occurred due to wildfires at the wildland-urban interface (WUI). In these fires, spread via the transport of firebrands (burning embers) plays a sig...
Article
The transition through the first year of university study is challenging for the majority of students. For students from Culturally and Linguistically Diverse (CALD) backgrounds, commencing studies in an Engli...
Chapter and Conference Paper
In a series of recent articles (from 2011 to 2017), Schindler et al. show that exponent/scalar blinding is not as effective a countermeasure as expected against side-channel attacks targeting RSA modular exponent...
Chapter
Attrition rates are typically higher in English-medium university programs in the Arab Gulf States than in programs offered in Arabic. This paper reports on the results of a study of academic engagement at a p...
Chapter
Research has shown that vocabulary recognition skill is a readily measured and relatively robust predictor of second language performance in university settings in English-speaking countries. This study builds...
Chapter and Conference Paper
The probing security model is very popular to prove the side-channel security of cryptographic implementations protected by masking. A common approach to secure nonlinear functions in this model is to represen...
Chapter and Conference Paper
Implementations of cryptographic algorithms are vulnerable to Side-Channel Analyses extracting information from the device behaviour. When such an attack targets the manipulation of several, say d, intermediate v...
Chapter and Conference Paper
Many applications of embedded devices require the generation of cryptographic secret parameters during the life cycle of the product. In such an unsafe context, several papers have shown that key generation al...
Chapter and Conference Paper
The resistance of a cryptographic implementation with regards to side-channel analysis is often quantified by measuring the success rate of a given attack. This approach cannot always be followed in practice, ...
Chapter and Conference Paper
Masking is a widely used countermeasure to protect block cipher implementations against side-channel attacks. The principle is to split every sensitive intermediate variable occurring in the computation into ...
Article
This paper presents findings of a study of recognition vocabulary knowledge as a predictor of written Academic English Proficiency (AEP) and overall Academic Achievement in an English medium higher education p...
Chapter and Conference Paper
Side-Channel Analysis (SCA) is commonly used to recover secret keys involved in the implementation of publicly known cryptographic algorithms. On the other hand, Side-Channel Analysis for Reverse Engineering (...
Chapter and Conference Paper
Side-channel attacks usually apply a divide-and-conquer strategy, separately recovering different parts of the secret. Their efficiency in practice relies on the adversary ability to precisely assess the succe...
Chapter and Conference Paper
Since the introduction of side channel attacks in the nineties, a large amount of work has been devoted to their effectiveness and efficiency improvements. On the one side, general results and conclusions are ...
Chapter and Conference Paper
At CHES 2011 Goubin and Martinelli described a new countermeasure against side-channel analysis for AES based on Shamir’s secret-sharing scheme. In the present paper, we exhibit a flaw in this scheme and we sh...
Chapter and Conference Paper
In this paper we study the collision-correlation attack published by Clavier et al. at CHES 2011 on a 1st-order Boolean masking scheme and show its lack of robustness against unknown and high level ...
Article
Higher-order side channel analysis (HO-SCA) is a powerful technique against cryptographic implementations and the design of appropriate countermeasures is nowadays an important topic. In parallel, another clas...
Article
This paper deals with dimension reduction in linearized elastoplasticity in the rate-independent case. The reference configuration of the elastoplastic body is given by a two-dimensional middle surface and a s...
Chapter and Conference Paper
Many papers deal with the problem of constructing an efficient masking scheme for existing block ciphers. We take the reverse approach: that is, given a proven masking scheme (Rivain and Prouff, CHES 2010) we ...