LEADER 03948nam 22011893a 450 001 9910346673703321 005 20250203235431.0 010 $a9783039210015 010 $a3039210017 024 8 $a10.3390/books978-3-03921-001-5 035 $a(CKB)4920000000094930 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/59342 035 $a(ScCtBLL)812dddf7-ea06-422c-98bc-de779c9b3b06 035 $a(OCoLC)1117898373 035 $a(oapen)doab59342 035 $a(EXLCZ)994920000000094930 100 $a20250203i20192019 uu 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aSide Channel Attacks$fSeokhie Hong 210 $cMDPI - Multidisciplinary Digital Publishing Institute$d2019 210 1$aBasel, Switzerland :$cMDPI,$d2019. 215 $a1 electronic resource (258 p.) 311 08$a9783039210008 311 08$a3039210009 330 $aThis Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on. 606 $aHistory of engineering and technology$2bicssc 610 $abinary Huff curve 610 $aFPGA 610 $apost quantum cryptography 610 $adata loss 610 $aside-channel cache attacks 610 $arsa cryptosystem 610 $afirst-order analysis 610 $achaotic circuit 610 $aintegrity 610 $aad libraries 610 $apower-analysis attack 610 $asingle trace analysis 610 $aside-channel authentication 610 $aprovable security 610 $aad lib 610 $acache misses 610 $acache side-channel attack 610 $aleakage model 610 $aNTRU 610 $agraph 610 $aAES 610 $ahardware security 610 $arecovery of secret exponent by triangular trace analysis 610 $aside-channel attacks 610 $ainformation leakage 610 $adata outsourcing 610 $aCPLD 610 $ascatter-gather implementation 610 $amodular exponentiation 610 $alattice-based cryptography 610 $aelliptic curve cryptography 610 $aGaussian sampling 610 $apost-quantum cryptography 610 $areliability 610 $aunified point addition 610 $aad networks 610 $agraph similarity 610 $amobile ads 610 $aphysically unclonable function 610 $atweakable block cipher 610 $aMerkle (hash) tree 610 $amachine-learning classification 610 $aside channel attack 610 $aonline authentication 610 $aside channel analysis 610 $afinancial IC card 610 $aside-channel attack 610 $are-keying 610 $acloud computing 610 $acryptographic keys 610 $achaos theory 610 $ahorizontal collision correlation analysis 610 $acountermeasure 610 $aembedded system security 610 $acache attack 610 $asingle-trace attack 610 $asoftware development kit (SDK) 610 $aCDT sampling 610 $akey bit-dependent attack 610 $aside-channel analysis 610 $asecond-order analysis 610 $aconstant-time cryptographic algorithm 610 $aandroid package (APK) 610 $achallenge-response authentication 615 7$aHistory of engineering and technology 700 $aHong$b Seokhie$01329303 801 0$bScCtBLL 801 1$bScCtBLL 906 $aBOOK 912 $a9910346673703321 996 $aSide Channel Attacks$93039404 997 $aUNINA