Reprint

Side Channel Attacks

Edited by
June 2019
258 pages
  • ISBN978-3-03921-000-8 (Paperback)
  • ISBN978-3-03921-001-5 (PDF)

This book is a reprint of the Special Issue Side Channel Attacks that was published in

Biology & Life Sciences
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Physical Sciences
Summary

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Format
  • Paperback
License
© 2019 by the authors; CC BY-NC-ND license
Keywords
cache attack; cache side-channel attack; constant-time cryptographic algorithm; rsa cryptosystem; scatter-gather implementation; modular exponentiation; post-quantum cryptography; lattice-based cryptography; Gaussian sampling; CDT sampling; side-channel attack; single trace analysis; mobile ads; software development kit (SDK), android package (APK), ad lib; ad libraries; ad networks; graph; graph similarity; side-channel authentication; leakage model; AES; FPGA; unified point addition; binary Huff curve; recovery of secret exponent by triangular trace analysis; horizontal collision correlation analysis; side channel analysis; single trace analysis; post quantum cryptography; NTRU; side-channel analysis; elliptic curve cryptography; single-trace attack; key bit-dependent attack; countermeasure; side channel analysis; financial IC card; first-order analysis; second-order analysis; data outsourcing; integrity; online authentication; Merkle (hash) tree; data loss; information leakage; reliability; side-channel analysis; power-analysis attack; embedded system security; machine-learning classification; side-channel cache attacks; cache misses; AES; cloud computing; physically unclonable function; chaos theory; chaotic circuit; FPGA; CPLD; challenge-response authentication; hardware security; side-channel attacks; cryptographic keys; side channel attack; re-keying; tweakable block cipher; provable security; n/a