中国机械工程学会生产工程分会知识服务平台

会议文集


文集名Constructive Approaches for Security Analysis and Design of Embedded Systems
会议名1st International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems (CASCADE 2025)
中译名《第一届国际嵌入式系统安全分析与设计的构造方法会议》
会议日期April 2-4, 2025
会议地点Saint-Etienne, France
出版年2026
馆藏号359394


题名作者出版年
Simple Power Analysis Assisted Chosen Cipher-Text Attack on ML-KEMAlexandre Berzati; Andersson Calle Viera; Maya Chartouny; David Vigilant2026
A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS)Jonas Schupp; Georg Sigl2026
Improvement of Side-Channel Attacks on MitakaVladimir Sarde; Nicolas Debande2026
Message-Recovery Horizontal Correlation Attack on Classic McElieceBrice Colombier; Vincent Grosso; Pierre-Louis Cayrel; Vlad-Florin Dragoi2026
Breaking HuFu with 0 Leakage A Side-Channel AnalysisJulien Devevey; Morgane Guerreau; Thomas Legavre; Ange Martinelli; Thomas Ricosset2026
X2X: Low-Randomness and High-Throughput A2B and B2A Conversions for d + 1 Shares in HardwareQuinten Norga; Jan-Pieter D'Anvers; Suparna Kundu; Ingrid Verbauwhede2026
Area Efficient Polynomial Arithmetic Accelerator for Post-quantum Digital Signatures and KEMsDina Kamel; Francois-Xavier Standaert2026
Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based AlgorithmsMohamed Abdelmonem; Lukas Holzbaur; Havard Raddum; Alexander Zeh2026
A Fault-Resistant NTT by Polynomial Evaluation and Interpolation Application to ML-KEM and ML-DSASven Bauer; Fabrizio De Santis; Kristjane Koleci; Anita Aghaie2026
Hybrid Homomorphic Encryption Resistance to Side-Channel AttacksPierugo Pace; Herve Pelletier; Serge Vaudenay2026
White-Box Implementation Techniques for the HFE FamilyPierre Galissant; Louis Goubin2026
The Dangerous Message/Key Swap in HMACAntoine Wurcker; David Marcais2026
Practical Second-Order CPA Attack on ASCON with Proper Selection FunctionViet Sang Nguyen; Vincent Grosso; Pierre-Louis Cayrel2026
On the Success Rate of Simple Side-Channel Attacks Against Masking with Unlimited Attack TracesAymeric Hiltenbrand; Julien Eynard; Romain Poussier2026
A Comparison of Graph-Inference Side-Channel Attacks Against SKINNYStian Husum; Havard Raddum; Martijn Stam2026
Robust and Reliable PUF Protocol Exploiting Non-monotonic Quantization and Neyman-Pearson LemmaNeelam Nasir; Julien Beguinot; Wei Cheng; Ulrich Kuhne; Jean-Luc Danger2026
Towards Package Opening Detection at Power-up by Monitoring Thermal DissipationJulien Toulemont; Geoffrey Chancel; Frederick Mailly; Philippe Maurine; Pascal Nouet2026
Partial Key Overwrite Attacks in Microcontrollers: A SurveyPcy Sluys; Lennert Wouters; Benedikt Gierlichs; Ingrid Verbauwhede2026
Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-VLinus Mainka; Kostas Papagiannopoulos2026
A Hardware Design Methodology to Prevent Microarchitectural Transition LeakagesMathieu Escouteloup; Vincent Migliore2026
12