Pub Date : 2017-09-25DOI: 10.1007/978-3-319-66787-4_27
D. Bernstein, Joachim Breitner, Daniel Genkin, L. G. Bruinderink, N. Heninger, T. Lange, C. V. Vredendaal, Y. Yarom
{"title":"Sliding Right into Disaster: Left-to-Right Sliding Windows Leak","authors":"D. Bernstein, Joachim Breitner, Daniel Genkin, L. G. Bruinderink, N. Heninger, T. Lange, C. V. Vredendaal, Y. Yarom","doi":"10.1007/978-3-319-66787-4_27","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_27","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-25DOI: 10.1007/978-3-319-66787-4_22
Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim
{"title":"Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications","authors":"Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim","doi":"10.1007/978-3-319-66787-4_22","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_22","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115778749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-25DOI: 10.1007/978-3-319-66787-4_7
J. Daemen
{"title":"Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing","authors":"J. Daemen","doi":"10.1007/978-3-319-66787-4_7","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_7","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-25DOI: 10.1007/978-3-319-66787-4_9
Stéphanie Anceau, P. Bleuet, J. Clédière, L. Maingault, J. Rainard, R. Tucoulou
{"title":"Nanofocused X-Ray Beam to Reprogram Secure Circuits","authors":"Stéphanie Anceau, P. Bleuet, J. Clédière, L. Maingault, J. Rainard, R. Tucoulou","doi":"10.1007/978-3-319-66787-4_9","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_9","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128151560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-25DOI: 10.1007/978-3-319-66787-4_23
Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun
{"title":"Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks","authors":"Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun","doi":"10.1007/978-3-319-66787-4_23","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_23","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-25DOI: 10.1007/978-3-319-66787-4_13
Wen Wang, Jakub Szefer, R. Niederhagen
{"title":"FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes","authors":"Wen Wang, Jakub Szefer, R. Niederhagen","doi":"10.1007/978-3-319-66787-4_13","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_13","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121088008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-25DOI: 10.1007/978-3-319-66787-4_2
Christophe Clavier, Léo Reynaud
{"title":"Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages","authors":"Christophe Clavier, Léo Reynaud","doi":"10.1007/978-3-319-66787-4_2","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_2","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123265533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-25DOI: 10.1007/978-3-319-66787-4_3
Eleonora Cagli, Cécile Canovas, E. Prouff
{"title":"Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing","authors":"Eleonora Cagli, Cécile Canovas, E. Prouff","doi":"10.1007/978-3-319-66787-4_3","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_3","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122738664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-25DOI: 10.1007/978-3-319-66787-4_6
Hannes Gross, S. Mangard
{"title":"Reconciling d+1 Masking in Hardware and Software","authors":"Hannes Gross, S. Mangard","doi":"10.1007/978-3-319-66787-4_6","DOIUrl":"https://doi.org/10.1007/978-3-319-66787-4_6","url":null,"abstract":"","PeriodicalId":394286,"journal":{"name":"Workshop on Cryptographic Hardware and Embedded Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}