Skip to product information
1 of 1

Shulph Ink

Constructive Side-Channel Analysis and Secure Design: 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings

Constructive Side-Channel Analysis and Secure Design: 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings

Dispatches within 2 to 4 weeks
Regular price £45.80 GBP
Regular price £54.99 GBP Sale price £45.80 GBP
Sale Sold out
Taxes included. Shipping calculated at checkout.

YOU SAVE £9.19

  • Condition: Brand new
  • UK Delivery times: Usually arrives within 2 - 3 working days
  • UK Shipping: Fee starts at £2.39. Subject to product weight & dimension

Bulk ordering. Want 15 or more copies? Get a personalised quote and bigger discounts. Learn more about bulk orders.

  • More about Constructive Side-Channel Analysis and Secure Design: 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings

This book presents revised selected papers from COSADE 2022, covering implementation attacks, secure implementation, attack-resilient architectures, secure design, practical attacks, test platforms, and open benchmarks.

Format: Paperback / softback
Length: 277 pages
Publication date: 29 March 2022
Publisher: Springer Nature Switzerland AG


The 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, was held in Leuven, Belgium, in April 2022. This book presents revised selected papers from the workshop, encompassing a total of 12 full papers. These papers were meticulously reviewed and chosen from a pool of 25 submissions, covering a wide range of topics. The papers delve into various aspects of secure design, including implementation attacks, secure implementation, implementation attack-resilient architectures and schemes, secure design and evaluation, practical attacks, test platforms, and open benchmarks.

The first section of the book focuses on implementation attacks. The papers in this section explore various techniques and methods used to attack cryptographic systems and protocols, such as side-channel attacks, timing attacks, power analysis attacks, and differential power analysis attacks. The authors discuss the vulnerabilities and countermeasures associated with these attacks and provide insights into the design and implementation of secure systems that can withstand such attacks.

The second section of the book explores secure implementation. The papers in this section discuss the design and implementation of secure cryptographic algorithms, protocols, and systems. The authors discuss the use of secure programming languages, libraries, and tools to ensure the confidentiality, integrity, and authenticity of data and messages. The papers also address the challenges of implementing secure systems in resource-constrained environments, such as embedded systems and mobile devices.

The third section of the book focuses on implementation attack-resilient architectures and schemes. The papers in this section explore the design and implementation of secure systems that can withstand various types of implementation attacks, such as cache attacks, timing attacks, and power analysis attacks. The authors discuss the use of countermeasures, such as encryption, hashing, and randomization, to mitigate the impact of these attacks and provide insights into the trade-offs between security and performance.

The fourth section of the book explores secure design and evaluation. The papers in this section discuss the use of formal methods, such as model checking and theorem proving, to evaluate the security of cryptographic systems and protocols. The authors discuss the advantages and limitations of these methods and provide examples of their application in the design and analysis of secure systems.

The fifth section of the book focuses on practical attacks. The papers in this section explore the use of real-world attacks and scenarios to evaluate the security of cryptographic systems and protocols. The authors discuss the techniques and methods used in these attacks and provide insights into the vulnerabilities and countermeasures associated with these attacks.

The sixth section of the book explores test platforms and open benchmarks. The papers in this section discuss the development and use of test platforms and open benchmarks for evaluating the security of cryptographic systems and protocols. The authors discuss the advantages and limitations of these platforms and provide examples of their application in the evaluation of secure systems.

In conclusion, this book provides a comprehensive overview of the latest research and developments in the field of secure design and side-channel analysis. The papers presented in this volume cover a wide range of topics and provide valuable insights into the challenges and opportunities in the field. The book is intended for researchers, practitioners, and students interested in the field of secure design and side-channel analysis.

Weight: 444g
Dimension: 235 x 155 (mm)
ISBN-13: 9783030997656
Edition number: 1st ed. 2022

This item can be found in:

UK and International shipping information

UK Delivery and returns information:

  • Delivery within 2 - 3 days when ordering in the UK.
  • Shipping fee for UK customers from £2.39. Fully tracked shipping service available.
  • Returns policy: Return within 30 days of receipt for full refund.

International deliveries:

Shulph Ink now ships to Australia, Belgium, Canada, France, Germany, Ireland, Italy, India, Luxembourg Saudi Arabia, Singapore, Spain, Netherlands, New Zealand, United Arab Emirates, United States of America.

  • Delivery times: within 5 - 10 days for international orders.
  • Shipping fee: charges vary for overseas orders. Only tracked services are available for most international orders. Some countries have untracked shipping options.
  • Customs charges: If ordering to addresses outside the United Kingdom, you may or may not incur additional customs and duties fees during local delivery.
View full details