Constructive Approaches for Security Analysis and Design of Embedded Systems : First International Conference, CASCADE 2025, Saint-Etienne, France, April 2-4, 2025, Proceedings (Lecture Notes in Computer Science)

個数:
  • ポイントキャンペーン

Constructive Approaches for Security Analysis and Design of Embedded Systems : First International Conference, CASCADE 2025, Saint-Etienne, France, April 2-4, 2025, Proceedings (Lecture Notes in Computer Science)

  • ウェブストア価格 ¥17,681(本体¥16,074)
  • Springer(2025/09発売)
  • 外貨定価 US$ 79.99
  • 【ウェブストア限定】洋書・洋古書ポイント5倍対象商品(~2/28)
  • ポイント 800pt
  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 602 p.
  • 言語 ENG
  • 商品コード 9783032014047

Description

This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2 4, 2025.
The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks;  Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.

.-Attacks on Symmetric Cryptography.

.- The Dangerous Message/Key Swap in HMAC.

.- Practical Second-Order CPA Attack on Ascon with Proper Selection
Function.

.- Side-Channel Attacks.

.- On the Success Rate of Simple Side-Channel Attacks against Masking
with Unlimited Attack Traces.

.- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY. 

.- Physical Security.

.- Robust and Reliable PUF Protocol Exploiting Non-Monotonic
Quantization and Neyman-Pearson Lemma.

.- Towards Package Opening Detection at Power-up by Monitoring
Thermal Dissipation.

.- Partial Key Overwrite Attacks in Microcontrollers: a Survey.

.- RISC-V.

.- Combined Masking and Shuffling for Side-Channel Secure Ascon on
RISC-V.

.- A Hardware Design Methodology to Prevent Microarchitectural
Transition Leakages.

.- Machine Learning.

.- Taking AI-Based Side-Channel Attacks to a New Dimension.

.- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for
Deep Learning-based Side-Channel Analysis.

.- Improving Leakage Exploitability in Horizontal Side Channel Attacks
through Anomaly Mitigation with Unsupervised Neural Networks.

.- Profiling Side-Channel Attack on HQC Polynomial Multiplication
Using Machine Learning Methods.

.- Attacks on Post-Quantum Cryptography.

.- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM.

.- A Horizontal Attack on the Codes and Restricted Objects Signature
Scheme (CROSS).

.- Vladimir Sarde and Nicolas Debande.

.- Message-Recovery Horizontal Correlation Attack on Classic McEliece.

.- Breaking HuFu with 0 Leakage: A Side-Channel Analysis.

.- Securing Post-Quantum Cryptography.

.- X2X: Low-Randomness and High-Throughput A2B and B2A
conversions for d+1 shares in Hardware.

.- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum
Digital Signatures and KEMs.

.- Efficient Error Detection Methods for the Number Theoretic Transforms
in Lattice-Based Algorithms.

.- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation.

.- Homomorphic Encryption and White-Box Cryptography.

.- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks.

.- White-Box Implementation Techniques for the HFE Family. 


最近チェックした商品