01112nam a2200265 i 4500991000431789707536091113s2008 it 001 0 ita d9788842087946b13856339-39ule_instDip.to Studi Giuridiciita305.892409422Levis Sullam, Simon,1974-472009L'archivio antiebraico :il linguaggio dell'antisemitismo moderno /Simon Levis SullamRoma ;Bari :Laterza,2008101 p. ;21 cmQuadrante Laterza ;145Contiene un indiceAntisemitismoStoriaSec. 18.-21..b1385633928-01-1413-11-09991000431789707536LE007 Sc. Pol. 909 LEV 01.0112007000212165le007LE007 2011 Sc. Pol.pE14.00-l- 00000.i1530526026-07-11LE027 305.89 LEV01.0112027000236022le027-E14.00-l- 00000.i1506832802-02-10Archivio antiebraico228870UNISALENTOle007(2)le02713-11-09ma -itait 2003948nam 22011893a 450 991034667370332120250203235431.09783039210015303921001710.3390/books978-3-03921-001-5(CKB)4920000000094930(oapen)https://directory.doabooks.org/handle/20.500.12854/59342(ScCtBLL)812dddf7-ea06-422c-98bc-de779c9b3b06(OCoLC)1117898373(oapen)doab59342(EXLCZ)99492000000009493020250203i20192019 uu engurmn|---annantxtrdacontentcrdamediacrrdacarrierSide Channel AttacksSeokhie HongMDPI - Multidisciplinary Digital Publishing Institute2019Basel, Switzerland :MDPI,2019.1 electronic resource (258 p.)9783039210008 3039210009 This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.History of engineering and technologybicsscbinary Huff curveFPGApost quantum cryptographydata lossside-channel cache attacksrsa cryptosystemfirst-order analysischaotic circuitintegrityad librariespower-analysis attacksingle trace analysisside-channel authenticationprovable securityad libcache missescache side-channel attackleakage modelNTRUgraphAEShardware securityrecovery of secret exponent by triangular trace analysisside-channel attacksinformation leakagedata outsourcingCPLDscatter-gather implementationmodular exponentiationlattice-based cryptographyelliptic curve cryptographyGaussian samplingpost-quantum cryptographyreliabilityunified point additionad networksgraph similaritymobile adsphysically unclonable functiontweakable block cipherMerkle (hash) treemachine-learning classificationside channel attackonline authenticationside channel analysisfinancial IC cardside-channel attackre-keyingcloud computingcryptographic keyschaos theoryhorizontal collision correlation analysiscountermeasureembedded system securitycache attacksingle-trace attacksoftware development kit (SDK)CDT samplingkey bit-dependent attackside-channel analysissecond-order analysisconstant-time cryptographic algorithmandroid package (APK)challenge-response authenticationHistory of engineering and technologyHong Seokhie1329303ScCtBLLScCtBLLBOOK9910346673703321Side Channel Attacks3039404UNINA