Description
Smart Card Research and Advanced Applications, 1st ed. 2019
17th International Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papers
Security and Cryptology Series
Coordinators: Bilgin Begül, Fischer Jean-Bernard
Language: EnglishSubject for Smart Card Research and Advanced Applications:
Keywords
artificial intelligence; authentication; backpropagation; computer architecture; cryptography; data security; differential power analysis; embedded software; embedded systems; internet of things (IoT); java card; microcontrollers; neural networks; public key cryptography; reverse engineering; side channel attack; side-channel; smart card; template attacks
201 p. · 15.5x23.5 cm · Paperback
Description
/li>Contents
/li>
The 13 revised full papers presented in this book were carefully reviewed and selected from 28 submissions.
CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.
Convolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations.- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES.- Improving Side-channel Analysis through Semi-supervised Learning.- Non-profiled Mask Recovery: the impact of Independent Component Analysis.- How (not) to Use Welch’s T-test in Side-Channel Security Evaluations.- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys.- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M.- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication.- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs.- Electromagnetic Activity vs. Logical Activity : Near Field Scans for Reverse Engineering.- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P.- Breaking all the Things — A Systematic Survey of Firmware Extraction Techniques for IoT Devices.- Exploiting JCVM on smart cards using forged references in the API calls.