This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025. The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.
Edited by:
Matthieu Rivain, Pascal Sasdrich Imprint: Springer Nature Switzerland AG Country of Publication: Switzerland Dimensions:
Height: 235mm,
Width: 155mm,
ISBN:9783032014047 ISBN 10: 3032014042 Series:Lecture Notes in Computer Science Pages: 604 Publication Date:21 October 2025 Audience:
Professional and scholarly
,
Undergraduate
Format:Paperback Publisher's Status: Active
.-Attacks on Symmetric Cryptography. .- The Dangerous Message/Key Swap in HMAC. .- Practical Second-Order CPA Attack on Ascon with Proper Selection Function. .- Side-Channel Attacks. .- On the Success Rate of Simple Side-Channel Attacks against Masking with Unlimited Attack Traces. .- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY. .- Physical Security. .- Robust and Reliable PUF Protocol Exploiting Non-Monotonic Quantization and Neyman-Pearson Lemma. .- Towards Package Opening Detection at Power-up by Monitoring Thermal Dissipation. .- Partial Key Overwrite Attacks in Microcontrollers: a Survey. .- RISC-V. .- Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V. .- A Hardware Design Methodology to Prevent Microarchitectural Transition Leakages. .- Machine Learning. .- Taking AI-Based Side-Channel Attacks to a New Dimension. .- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis. .- Improving Leakage Exploitability in Horizontal Side Channel Attacks through Anomaly Mitigation with Unsupervised Neural Networks. .- Profiling Side-Channel Attack on HQC Polynomial Multiplication Using Machine Learning Methods. .- Attacks on Post-Quantum Cryptography. .- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM. .- A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS). .- Vladimir Sarde and Nicolas Debande. .- Message-Recovery Horizontal Correlation Attack on Classic McEliece. .- Breaking HuFu with 0 Leakage: A Side-Channel Analysis. .- Securing Post-Quantum Cryptography. .- X2X: Low-Randomness and High-Throughput A2B and B2A conversions for d+1 shares in Hardware. .- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum Digital Signatures and KEMs. .- Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms. .- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation. .- Homomorphic Encryption and White-Box Cryptography. .- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks. .- White-Box Implementation Techniques for the HFE Family.