先进制造业知识服务平台
国家科技图书文献中心机械分馆  工信部产业技术基础公共服务平台  国家中小企业公共服务示范平台

会议文集


文集名Constructive Approaches for Security Analysis and Design of Embedded Systems
会议名1st International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems (CASCADE 2025)
中译名《第一届国际嵌入式系统安全分析与设计的构造方法会议》
会议日期April 2-4, 2025
会议地点Saint-Etienne, France
出版年2026
馆藏号359394


题名作者出版年
Simple Power Analysis Assisted Chosen Cipher-Text Attack on ML-KEMAlexandre Berzati; Andersson Calle Viera; Maya Chartouny; David Vigilant2026
A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS)Jonas Schupp; Georg Sigl2026
Improvement of Side-Channel Attacks on MitakaVladimir Sarde; Nicolas Debande2026
Message-Recovery Horizontal Correlation Attack on Classic McElieceBrice Colombier; Vincent Grosso; Pierre-Louis Cayrel; Vlad-Florin Dragoi2026
Breaking HuFu with 0 Leakage A Side-Channel AnalysisJulien Devevey; Morgane Guerreau; Thomas Legavre; Ange Martinelli; Thomas Ricosset2026
X2X: Low-Randomness and High-Throughput A2B and B2A Conversions for d + 1 Shares in HardwareQuinten Norga; Jan-Pieter D'Anvers; Suparna Kundu; Ingrid Verbauwhede2026
Area Efficient Polynomial Arithmetic Accelerator for Post-quantum Digital Signatures and KEMsDina Kamel; Francois-Xavier Standaert2026
Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based AlgorithmsMohamed Abdelmonem; Lukas Holzbaur; Havard Raddum; Alexander Zeh2026
A Fault-Resistant NTT by Polynomial Evaluation and Interpolation Application to ML-KEM and ML-DSASven Bauer; Fabrizio De Santis; Kristjane Koleci; Anita Aghaie2026
Hybrid Homomorphic Encryption Resistance to Side-Channel AttacksPierugo Pace; Herve Pelletier; Serge Vaudenay2026
White-Box Implementation Techniques for the HFE FamilyPierre Galissant; Louis Goubin2026
The Dangerous Message/Key Swap in HMACAntoine Wurcker; David Marcais2026
Practical Second-Order CPA Attack on ASCON with Proper Selection FunctionViet Sang Nguyen; Vincent Grosso; Pierre-Louis Cayrel2026
On the Success Rate of Simple Side-Channel Attacks Against Masking with Unlimited Attack TracesAymeric Hiltenbrand; Julien Eynard; Romain Poussier2026
A Comparison of Graph-Inference Side-Channel Attacks Against SKINNYStian Husum; Havard Raddum; Martijn Stam2026
Robust and Reliable PUF Protocol Exploiting Non-monotonic Quantization and Neyman-Pearson LemmaNeelam Nasir; Julien Beguinot; Wei Cheng; Ulrich Kuhne; Jean-Luc Danger2026
Towards Package Opening Detection at Power-up by Monitoring Thermal DissipationJulien Toulemont; Geoffrey Chancel; Frederick Mailly; Philippe Maurine; Pascal Nouet2026
Partial Key Overwrite Attacks in Microcontrollers: A SurveyPcy Sluys; Lennert Wouters; Benedikt Gierlichs; Ingrid Verbauwhede2026
Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-VLinus Mainka; Kostas Papagiannopoulos2026
A Hardware Design Methodology to Prevent Microarchitectural Transition LeakagesMathieu Escouteloup; Vincent Migliore2026
12