PRIZES to win! PROMOTIONS

Close Notification

Your cart does not contain any items

Constructive Approaches for Security Analysis and Design of Embedded Systems

First International Conference, CASCADE 2025, Saint-Etienne, France, April 2–4, 2025, Proceedings...

Matthieu Rivain Pascal Sasdrich

$191.95   $153.86

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer Nature Switzerland AG
21 October 2025
This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025. The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks;  Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.
Edited by:   ,
Imprint:   Springer Nature Switzerland AG
Country of Publication:   Switzerland
Dimensions:   Height: 235mm,  Width: 155mm, 
ISBN:   9783032014047
ISBN 10:   3032014042
Series:   Lecture Notes in Computer Science
Pages:   604
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Active
.-Attacks on Symmetric Cryptography. .- The Dangerous Message/Key Swap in HMAC. .- Practical Second-Order CPA Attack on Ascon with Proper Selection Function. .- Side-Channel Attacks. .- On the Success Rate of Simple Side-Channel Attacks against Masking with Unlimited Attack Traces. .- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.  .- Physical Security. .- Robust and Reliable PUF Protocol Exploiting Non-Monotonic Quantization and Neyman-Pearson Lemma. .- Towards Package Opening Detection at Power-up by Monitoring Thermal Dissipation. .- Partial Key Overwrite Attacks in Microcontrollers: a Survey. .- RISC-V. .- Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V. .- A Hardware Design Methodology to Prevent Microarchitectural Transition Leakages. .- Machine Learning. .- Taking AI-Based Side-Channel Attacks to a New Dimension. .- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis. .- Improving Leakage Exploitability in Horizontal Side Channel Attacks through Anomaly Mitigation with Unsupervised Neural Networks. .- Profiling Side-Channel Attack on HQC Polynomial Multiplication Using Machine Learning Methods. .- Attacks on Post-Quantum Cryptography. .- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM. .- A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS). .- Vladimir Sarde and Nicolas Debande. .- Message-Recovery Horizontal Correlation Attack on Classic McEliece. .- Breaking HuFu with 0 Leakage: A Side-Channel Analysis. .- Securing Post-Quantum Cryptography. .- X2X: Low-Randomness and High-Throughput A2B and B2A conversions for d+1 shares in Hardware. .- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum Digital Signatures and KEMs. .- Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms. .- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation. .- Homomorphic Encryption and White-Box Cryptography. .- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks. .- White-Box Implementation Techniques for the HFE Family. 

See Also