000866061 000__ 03612cam\a2200529Ii\4500 000866061 001__ 866061 000866061 005__ 20230306145809.0 000866061 006__ m\\\\\o\\d\\\\\\\\ 000866061 007__ cr\cn\nnnunnun 000866061 008__ 190311s2019\\\\sz\a\\\\o\\\\\101\0\eng\d 000866061 019__ $$a1091333812 000866061 020__ $$a9783030154622$$q(electronic book) 000866061 020__ $$a3030154629$$q(electronic book) 000866061 020__ $$z9783030154615 000866061 0247_ $$a10.1007/978-3-030-15462-2$$2doi 000866061 035__ $$aSP(OCoLC)on1089693010 000866061 035__ $$aSP(OCoLC)1089693010$$z(OCoLC)1091333812 000866061 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dUKMGB$$dYDX$$dUPM 000866061 049__ $$aISEA 000866061 050_4 $$aTK7895.S62 000866061 08204 $$a006.2/46$$223 000866061 1112_ $$aCARDIS (Conference)$$n(17th :$$d2018 :$$cMontpellier, France) 000866061 24510 $$aSmart card research and advanced applications :$$b17th International Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018, Revised selected papers /$$cBegül Bilgin, Jean-Bernard Fischer (eds.). 000866061 2463_ $$aCARDIS 2018 000866061 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000866061 300__ $$a1 online resource (x, 201 pages) :$$billustrations. 000866061 336__ $$atext$$btxt$$2rdacontent 000866061 337__ $$acomputer$$bc$$2rdamedia 000866061 338__ $$aonline resource$$bcr$$2rdacarrier 000866061 347__ $$atext file$$bPDF$$2rda 000866061 4901_ $$aLecture notes in computer science ;$$v11389 000866061 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000866061 500__ $$aIncludes author index. 000866061 5050_ $$aConvolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations.- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES.- Improving Side-channel Analysis through Semi-supervised Learning.- Non-profiled Mask Recovery: the impact of Independent Component Analysis.- How (not) to Use Welch's T-test in Side-Channel Security Evaluations.- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys.- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M.- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication.- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs.- Electromagnetic Activity vs. Logical Activity : Near Field Scans for Reverse Engineering.- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P.- Breaking all the Things -- A Systematic Survey of Firmware Extraction Techniques for IoT Devices.- Exploiting JCVM on smart cards using forged references in the API calls. 000866061 506__ $$aAccess limited to authorized users. 000866061 520__ $$aThis book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Smart Card Research and Advanced Applications, CARDIS 2018, held in Monpellier, France, in November 2018. The 13 revised full papers presented in this book were carefully reviewed and selected from 28 submissions. CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications. 000866061 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 11, 2019). 000866061 650_0 $$aSmart cards$$vCongresses. 000866061 7001_ $$aBilgin, Begül,$$eeditor. 000866061 7001_ $$aFischer, Jean-Bernard,$$eeditor. 000866061 77608 $$iPrint version: :$$z9783030154615 000866061 830_0 $$aLecture notes in computer science ;$$v11389. 000866061 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000866061 852__ $$bebk 000866061 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-15462-2$$zOnline Access$$91397441.1 000866061 909CO $$ooai:library.usi.edu:866061$$pGLOBAL_SET 000866061 980__ $$aEBOOK 000866061 980__ $$aBIB 000866061 982__ $$aEbook 000866061 983__ $$aOnline 000866061 994__ $$a92$$bISE