SCAs 2019: Side Channel Attacks and Countermeasures |
Call for Papers for Special Issue "Side Channel Attacks and Countermeasures" in Applied Sciences
Journal Applied Sciences
Applied Sciences (ISSN 2076-3417) is an international open access journal on all aspects of applied natural sciences published monthly online by MDPI. It is indexed on Science Citation Index (Impact Factor 1.689 for 2017), Scopus, Inspec (IET) and other databases.
Guest Editor of Special Issue
Interests: Side-Channel Analysis, Fault Analysis, Cryptographic Engineering
Aim and Scope of Special Issue
https://www.mdpi.com/journal/applsci/special_issues/attacks
Cryptosystems are widely used in a growing number of embedded applications, such as smart cards, smart phones, Internet of Things (IoT) devices, and so on. Although these cryptosystems have been proven to be safe using mathematical tools, they could be susceptible to physical attacks that exploit additional sources of information, including timing information, power consumption, electromagnetic emissions (EM), sound, and so on. First introduced by Kocher, these types of attacks are referred to as side-channel attacks (SCAs). These attacks pose a very serious threat to embedded systems with cryptographic algorithms. For the past few years, there has been a great deal of effort in finding various SCAs and developing secure countermeasures.
This Special Issue of Applied Sciences is dedicated to outlining the state-of-the-art technologies in the area of side-channel attacks. Topics of interest include (but are not limited to) the following:
- Power, EM, timing, acoustic, fault, and cache attacks;
- Countermeasures against side-channel attacks
- Higher-order side channel attacks;
- Higher-order masking countermeasures;
- Signal processing for side-channel attacks;
- Modeling of side-channel attacks;
- Profiling attacks;
- Machine learning-based side-channel attacks;
- Side-channel attacks against post-quantum cryptography;
- Single trace attacks against public key cryptosystems;
- Differential computation analysis against white-box cryptography and its countermeasures;
- Physical unclonable functions (PUFs).
Submission Guidelines
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website.
Contact
All questions about submissions should be emailed to xiaoyan.chen@mdpi.com