Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings: Lecture Notes in Computer Science, cartea 8731
Editat de Lejla Batina, Matthew Robshawen Limba Engleză Paperback – 22 sep 2014
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.37 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 390.69 lei - 20%
Preț: 527.36 lei - 15%
Preț: 388.50 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 389.72 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.14 lei - 20%
Preț: 391.20 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.77 lei - 20%
Preț: 392.64 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 639.72 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 5%
Preț: 516.27 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 403.00 lei - 20%
Preț: 535.77 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 392.06 lei
Puncte Express: 588
Preț estimativ în valută:
69.39€ • 81.09$ • 60.24£
69.39€ • 81.09$ • 60.24£
Carte tipărită la comandă
Livrare economică 19 februarie-05 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783662447086
ISBN-10: 3662447088
Pagini: 632
Ilustrații: XIV, 618 p. 192 illus.
Dimensiuni: 155 x 235 x 33 mm
Greutate: 0.88 kg
Ediția:2014
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3662447088
Pagini: 632
Ilustrații: XIV, 618 p. 192 illus.
Dimensiuni: 155 x 235 x 33 mm
Greutate: 0.88 kg
Ediția:2014
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Side-Channel Attacks.- EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor.- A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks.- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.- Good Is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory.- New Attacks and Constructions.- “Ooh Aah... Just a Little Bit” : A Small Amount of Side Channel Can Go a Long Way.- Destroying Fault Invariant with Randomization: A Countermeasure for AES against Differential Fault Attacks.- Reversing Stealthy Dopant-Level Circuits.- Constructing S-boxes for Lightweight Cryptography with FeistelStructure.- Countermeasures.- A Statistical Model for Higher Order DPA on Masked Devices.- Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures.- Secure Conversion between Boolean and Arithmetic Masking of Any Order.- Making RSA–PSS Provably Secure against Non-random Faults.- Algorithm Specific SCA.- Side-Channel Attack against RSA Key Generation Algorithms.- Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.- RSA Meets DPA: Recovering RSA Secret Keys from Noisy AnalogData.- Simple Power Analysis on AES Key Expansion Revisited.- ECC Implementations.- Efficient Pairings and ECC for Embedded Systems.- Curve41417: Karatsuba Revisited.- Implementations.- Cofactorization on Graphics Processing Units.- Enhanced Lattice-Based Signatures on Reconfigurable Hardware.- Compact Ring-LWE Cryptoprocessor.- Hardware Implementations of Symmetric Cryptosystems.- ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption.- FPGA Implementations of SPRING: And Their Countermeasures against Side-Channel Attacks.- FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison.- PUFs Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?.- Efficient Power and TimingSide Channels for Physical Unclonable Functions.- Physical Characterization of Arbiter PUFs.- Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM.- RNGs and SCA Issues in Hardware.- Embedded Evaluation of Randomness in Oscillator Based ElementaryTRNG.- Entropy Evaluation for Oscillator-Based True Random Number Generators.- Side-Channel Leakage through Static Power: Should We Care about in Practice.- Gate-Level Masking under a Path-Based Leakage Metric.- Early Propagation and Imbalanced Routing, How to Diminish inFPGAs.