Lightweight Cryptography for Security and Privacy [[electronic resource] ] : Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers / / edited by Thomas Eisenbarth, Erdinç Öztürk |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XIII, 169 p. 33 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Algorithms Cryptology Systems and Data Security Computer Communication Networks Algorithm Analysis and Problem Complexity |
ISBN | 3-319-16363-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers -- The Multiplicative Complexity of Boolean Functions on Four and Five Variables -- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher -- AES Smaller Than S-Box: Minimalism in Software Design on Low End Microcontrollers -- Differential Factors: Improved Attacks on SERPENT -- Ciphertext-Only Fault Attacks on PRESENT -- Relating Undisturbed Bits to Other Properties of Substitution Boxes -- Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock -- Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers -- A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity. |
Record Nr. | UNISA-996200345703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Lightweight Cryptography for Security and Privacy : Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers / / edited by Thomas Eisenbarth, Erdinç Öztürk |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XIII, 169 p. 33 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Algorithms Cryptology Systems and Data Security Computer Communication Networks Algorithm Analysis and Problem Complexity |
ISBN | 3-319-16363-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers -- The Multiplicative Complexity of Boolean Functions on Four and Five Variables -- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher -- AES Smaller Than S-Box: Minimalism in Software Design on Low End Microcontrollers -- Differential Factors: Improved Attacks on SERPENT -- Ciphertext-Only Fault Attacks on PRESENT -- Relating Undisturbed Bits to Other Properties of Substitution Boxes -- Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock -- Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers -- A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity. |
Record Nr. | UNINA-9910484066503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings / / edited by Sk Subidh Ali, Jean-Luc Danger, Thomas Eisenbarth |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXIV, 295 p. 55 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Computer security Data encryption (Computer science) Coding theory Information theory Computer communication systems Security Systems and Data Security Cryptology Coding and Information Theory Computer Communication Networks |
ISBN | 3-319-71501-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On the (in)Security of ChaCha20 Against Physical Attacks -- An Industrial Outlook on Challenges of Hardware Security in Digital Economy -- How to Digitally Construct and Validate TRNG and PUF Primitives Which Are Based on Physical Phenomenon -- Cache Attacks: From Cloud to Mobile -- May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 -- The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions -- Parameter Choices for LWE -- Efficient Side Channel Testing of Cryptographic Devices Using TVLA -- IoT Insecurity - Innovation and Incentives in Industry -- Hardware enabled cryptography: Physically Unclonable Functions and Random Numbers as Roots of Trust -- Tackling the Time-Defence: An Instruction Count Based Microarchitectural Side-channel Attack on Block Ciphers -- Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era -- Efficient Software Implementation of Laddering Algorithms over Binary Elliptic Curves -- Analysis of Diagonal Constants in Salsa -- Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults -- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices -- Similarity Based Interactive Private Information Retrieval -- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA) -- Variable-Length Bit Mapping and Error Correcting Codes for Higher-Order Alphabet PUFs -- Mutual Friend Attack Prevention in Social Network Data Publishing -- Short Integrated PKE+PEKS in Standard Model -- Differential Fault Attack on Grain v1, ACORN v3 and Lizard -- Certain observations on ACORN v3 and the Implications to TMDTO Attacks -- Efficient Implementation of Private License Plate Matching Protocols. . |
Record Nr. | UNISA-996466438303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy, and Applied Cryptography Engineering : 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings / / edited by Sk Subidh Ali, Jean-Luc Danger, Thomas Eisenbarth |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXIV, 295 p. 55 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Computer security Data encryption (Computer science) Coding theory Information theory Computer communication systems Security Systems and Data Security Cryptology Coding and Information Theory Computer Communication Networks |
ISBN | 3-319-71501-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On the (in)Security of ChaCha20 Against Physical Attacks -- An Industrial Outlook on Challenges of Hardware Security in Digital Economy -- How to Digitally Construct and Validate TRNG and PUF Primitives Which Are Based on Physical Phenomenon -- Cache Attacks: From Cloud to Mobile -- May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 -- The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions -- Parameter Choices for LWE -- Efficient Side Channel Testing of Cryptographic Devices Using TVLA -- IoT Insecurity - Innovation and Incentives in Industry -- Hardware enabled cryptography: Physically Unclonable Functions and Random Numbers as Roots of Trust -- Tackling the Time-Defence: An Instruction Count Based Microarchitectural Side-channel Attack on Block Ciphers -- Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era -- Efficient Software Implementation of Laddering Algorithms over Binary Elliptic Curves -- Analysis of Diagonal Constants in Salsa -- Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults -- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices -- Similarity Based Interactive Private Information Retrieval -- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA) -- Variable-Length Bit Mapping and Error Correcting Codes for Higher-Order Alphabet PUFs -- Mutual Friend Attack Prevention in Social Network Data Publishing -- Short Integrated PKE+PEKS in Standard Model -- Differential Fault Attack on Grain v1, ACORN v3 and Lizard -- Certain observations on ACORN v3 and the Implications to TMDTO Attacks -- Efficient Implementation of Private License Plate Matching Protocols. . |
Record Nr. | UNINA-9910483586103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Card Research and Advanced Applications [[electronic resource] ] : 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papers / / edited by Thomas Eisenbarth, Yannick Teglia |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XVI, 249 p. 80 illus.) |
Disciplina | 006 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Cryptology Systems and Data Security |
ISBN | 3-319-75208-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465497203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Card Research and Advanced Applications : 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papers / / edited by Thomas Eisenbarth, Yannick Teglia |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XVI, 249 p. 80 illus.) |
Disciplina | 006 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Cryptology Systems and Data Security |
ISBN | 3-319-75208-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910349261203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|