中国机械工程学会生产工程分会知识服务平台
主页
文献资源
外文期刊
外文会议
中文期刊
专业机构
生产工程
智能制造
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Constructive Approaches for Security Analysis and Design of Embedded Systems
会议名
1st International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems (CASCADE 2025)
中译名
《第一届国际嵌入式系统安全分析与设计的构造方法会议》
会议日期
April 2-4, 2025
会议地点
Saint-Etienne, France
出版年
2026
馆藏号
359394
题名
作者
出版年
Simple Power Analysis Assisted Chosen Cipher-Text Attack on ML-KEM
Alexandre Berzati; Andersson Calle Viera; Maya Chartouny; David Vigilant
2026
A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS)
Jonas Schupp; Georg Sigl
2026
Improvement of Side-Channel Attacks on Mitaka
Vladimir Sarde; Nicolas Debande
2026
Message-Recovery Horizontal Correlation Attack on Classic McEliece
Brice Colombier; Vincent Grosso; Pierre-Louis Cayrel; Vlad-Florin Dragoi
2026
Breaking HuFu with 0 Leakage A Side-Channel Analysis
Julien Devevey; Morgane Guerreau; Thomas Legavre; Ange Martinelli; Thomas Ricosset
2026
X2X: Low-Randomness and High-Throughput A2B and B2A Conversions for d + 1 Shares in Hardware
Quinten Norga; Jan-Pieter D'Anvers; Suparna Kundu; Ingrid Verbauwhede
2026
Area Efficient Polynomial Arithmetic Accelerator for Post-quantum Digital Signatures and KEMs
Dina Kamel; Francois-Xavier Standaert
2026
Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms
Mohamed Abdelmonem; Lukas Holzbaur; Havard Raddum; Alexander Zeh
2026
A Fault-Resistant NTT by Polynomial Evaluation and Interpolation Application to ML-KEM and ML-DSA
Sven Bauer; Fabrizio De Santis; Kristjane Koleci; Anita Aghaie
2026
Hybrid Homomorphic Encryption Resistance to Side-Channel Attacks
Pierugo Pace; Herve Pelletier; Serge Vaudenay
2026
White-Box Implementation Techniques for the HFE Family
Pierre Galissant; Louis Goubin
2026
The Dangerous Message/Key Swap in HMAC
Antoine Wurcker; David Marcais
2026
Practical Second-Order CPA Attack on ASCON with Proper Selection Function
Viet Sang Nguyen; Vincent Grosso; Pierre-Louis Cayrel
2026
On the Success Rate of Simple Side-Channel Attacks Against Masking with Unlimited Attack Traces
Aymeric Hiltenbrand; Julien Eynard; Romain Poussier
2026
A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY
Stian Husum; Havard Raddum; Martijn Stam
2026
Robust and Reliable PUF Protocol Exploiting Non-monotonic Quantization and Neyman-Pearson Lemma
Neelam Nasir; Julien Beguinot; Wei Cheng; Ulrich Kuhne; Jean-Luc Danger
2026
Towards Package Opening Detection at Power-up by Monitoring Thermal Dissipation
Julien Toulemont; Geoffrey Chancel; Frederick Mailly; Philippe Maurine; Pascal Nouet
2026
Partial Key Overwrite Attacks in Microcontrollers: A Survey
Pcy Sluys; Lennert Wouters; Benedikt Gierlichs; Ingrid Verbauwhede
2026
Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V
Linus Mainka; Kostas Papagiannopoulos
2026
A Hardware Design Methodology to Prevent Microarchitectural Transition Leakages
Mathieu Escouteloup; Vincent Migliore
2026
1
2
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2026