Side Channel Attacks
Abstract
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.
Keywords
n/a; binary Huff curve; FPGA; post quantum cryptography; data loss; side-channel cache attacks; rsa cryptosystem; first-order analysis; chaotic circuit; integrity; ad libraries; power-analysis attack; single trace analysis; side-channel authentication; provable security; ad lib; cache misses; cache side-channel attack; leakage model; NTRU; graph; AES; hardware security; recovery of secret exponent by triangular trace analysis; side-channel attacks; information leakage; data outsourcing; CPLD; scatter-gather implementation; modular exponentiation; lattice-based cryptography; elliptic curve cryptography; Gaussian sampling; post-quantum cryptography; reliability; unified point addition; ad networks; graph similarity; mobile ads; physically unclonable function; tweakable block cipher; Merkle (hash) tree; machine-learning classification; side channel attack; online authentication; side channel analysis; financial IC card; side-channel attack; re-keying; cloud computing; cryptographic keys; chaos theory; horizontal collision correlation analysis; countermeasure; embedded system security; cache attack; single-trace attack; software development kit (SDK); CDT sampling; key bit-dependent attack; side-channel analysis; second-order analysis; constant-time cryptographic algorithm; android package (APK); challenge-response authenticationISBN
9783039210008, 9783039210015Publisher website
www.mdpi.com/booksPublication date and place
2019Classification
History of engineering and technology