top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology – EUROCRYPT 2014 [[electronic resource] ] : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings / / edited by Phong Q. Nguyen, Elisabeth Oswald
Advances in Cryptology – EUROCRYPT 2014 [[electronic resource] ] : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings / / edited by Phong Q. Nguyen, Elisabeth Oswald
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XIV, 714 p. 77 illus.) : online resource
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Computer security
Cryptology
Algorithm Analysis and Problem Complexity
Systems and Data Security
ISBN 3-642-55220-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public key cryptanalysis -- Identity-based encryption -- Key derivation and quantum computing -- Secret-key analysis and implementations -- Obfuscation and multi linear maps -- Authenticated encryption -- Symmetric encryption -- Multi-party encryption -- Side-channel attacks -- Signatures and public-key encryption -- Functional encryption -- Foundations -- Multi-party computation.
Record Nr. UNISA-996203611203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings / / edited by Phong Q. Nguyen, Elisabeth Oswald
Advances in Cryptology – EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings / / edited by Phong Q. Nguyen, Elisabeth Oswald
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XIV, 714 p. 77 illus.) : online resource
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Computer security
Cryptology
Algorithm Analysis and Problem Complexity
Systems and Data Security
ISBN 3-642-55220-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public key cryptanalysis -- Identity-based encryption -- Key derivation and quantum computing -- Secret-key analysis and implementations -- Obfuscation and multi linear maps -- Authenticated encryption -- Symmetric encryption -- Multi-party encryption -- Side-channel attacks -- Signatures and public-key encryption -- Functional encryption -- Foundations -- Multi-party computation.
Record Nr. UNINA-9910484780403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2015 [[electronic resource] ] : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II / / edited by Elisabeth Oswald, Marc Fischlin
Advances in Cryptology – EUROCRYPT 2015 [[electronic resource] ] : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II / / edited by Elisabeth Oswald, Marc Fischlin
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 838 p. 102 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Computer security
Management information systems
Computer science
Cryptology
Algorithm Analysis and Problem Complexity
Systems and Data Security
Management of Computing and Information Systems
ISBN 3-662-46803-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Universal Signature Aggregators -- Fully Structure-Preserving Signatures and Shrinking Commitments -- Disjunctions for Hash Proof Systems: New Constructions and Applications -- Quasi-Adaptive NIZK for Linear Subspaces Revisited -- Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware -- Noisy Leakage -- Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge -- Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits Using Half Gates -- One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin -- The Bitcoin Backbone Protocol: Analysis and Applications -- Linear Secret Sharing Schemes from Error Correcting Codes -- Function Secret Sharing -- Cluster Computing in Zero Knowledge -- Hosting Services on an Untrusted Cloud -- How to Obfuscate Programs Directly -- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data -- Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World -- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation -- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings -- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model -- Cryptographic Reverse Firewalls -- Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols -- Authenticated Key Exchange from Ideal Lattices -- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model -- Privacy Amplification in the Isolated Qubits Model -- Generic Hardness of the Multiple Discrete Logarithm Problem.
Record Nr. UNISA-996207291903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2015 [[electronic resource] ] : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I / / edited by Elisabeth Oswald, Marc Fischlin
Advances in Cryptology – EUROCRYPT 2015 [[electronic resource] ] : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I / / edited by Elisabeth Oswald, Marc Fischlin
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVII, 818 p. 123 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Computer security
Management information systems
Computer science
Cryptology
Algorithm Analysis and Problem Complexity
Systems and Data Security
Management of Computing and Information Systems
ISBN 3-662-46800-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis of the Multilinear Map over the Integers -- Robust Authenticated-Encryption AEZ and the Problem That It Solves -- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks -- A Provable-Security Analysis of Intel’s Secure Key RNG -- A Formal Treatment of Backdoored Pseudorandom Generators -- Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields -- The Multiple Number Field Sieve with Conjugation and Generalized -- Better Algorithms for LWE and LWR -- On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes -- Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE -- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro -- Structural Evaluation by Generalized Integral Property -- Cryptanalysis of SP Networks with Partial Non-Linear Layers -- The Sum Can Be Weaker Than Each Part -- SPHINCS: Practical Stateless Hash-Based Signatures -- Making Masking Security Proofs Concrete: Or How to Evaluate the Security of Any Leaking Device -- Ciphers for MPC and FHE -- Verified Proofs of Higher-Order Masking -- Inner Product Masking Revisited -- Fully Homomophic Encryption over the Integers Revisited -- (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces -- KDM-CCA Security from RKA Secure Authenticated Encryption -- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks -- FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second -- Bootstrapping for HElib -- More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries -- How to Efficiently Evaluate RAM Programs with Malicious Security -- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function -- Twisted Polynomials and Forgery Attacks on GCM -- Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices.
Record Nr. UNISA-996207292003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II / / edited by Elisabeth Oswald, Marc Fischlin
Advances in Cryptology – EUROCRYPT 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II / / edited by Elisabeth Oswald, Marc Fischlin
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 838 p. 102 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Computer security
Management information systems
Computer science
Cryptology
Algorithm Analysis and Problem Complexity
Systems and Data Security
Management of Computing and Information Systems
ISBN 3-662-46803-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Universal Signature Aggregators -- Fully Structure-Preserving Signatures and Shrinking Commitments -- Disjunctions for Hash Proof Systems: New Constructions and Applications -- Quasi-Adaptive NIZK for Linear Subspaces Revisited -- Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware -- Noisy Leakage -- Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge -- Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits Using Half Gates -- One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin -- The Bitcoin Backbone Protocol: Analysis and Applications -- Linear Secret Sharing Schemes from Error Correcting Codes -- Function Secret Sharing -- Cluster Computing in Zero Knowledge -- Hosting Services on an Untrusted Cloud -- How to Obfuscate Programs Directly -- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data -- Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World -- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation -- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings -- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model -- Cryptographic Reverse Firewalls -- Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols -- Authenticated Key Exchange from Ideal Lattices -- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model -- Privacy Amplification in the Isolated Qubits Model -- Generic Hardness of the Multiple Discrete Logarithm Problem.
Record Nr. UNINA-9910483434903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I / / edited by Elisabeth Oswald, Marc Fischlin
Advances in Cryptology – EUROCRYPT 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I / / edited by Elisabeth Oswald, Marc Fischlin
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVII, 818 p. 123 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Computer security
Management information systems
Computer science
Cryptology
Algorithm Analysis and Problem Complexity
Systems and Data Security
Management of Computing and Information Systems
ISBN 3-662-46800-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis of the Multilinear Map over the Integers -- Robust Authenticated-Encryption AEZ and the Problem That It Solves -- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks -- A Provable-Security Analysis of Intel’s Secure Key RNG -- A Formal Treatment of Backdoored Pseudorandom Generators -- Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields -- The Multiple Number Field Sieve with Conjugation and Generalized -- Better Algorithms for LWE and LWR -- On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes -- Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE -- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro -- Structural Evaluation by Generalized Integral Property -- Cryptanalysis of SP Networks with Partial Non-Linear Layers -- The Sum Can Be Weaker Than Each Part -- SPHINCS: Practical Stateless Hash-Based Signatures -- Making Masking Security Proofs Concrete: Or How to Evaluate the Security of Any Leaking Device -- Ciphers for MPC and FHE -- Verified Proofs of Higher-Order Masking -- Inner Product Masking Revisited -- Fully Homomophic Encryption over the Integers Revisited -- (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces -- KDM-CCA Security from RKA Secure Authenticated Encryption -- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks -- FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second -- Bootstrapping for HElib -- More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries -- How to Efficiently Evaluate RAM Programs with Malicious Security -- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function -- Twisted Polynomials and Forgery Attacks on GCM -- Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices.
Record Nr. UNINA-9910484544903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Constructive Side-Channel Analysis and Secure Design [[electronic resource] ] : 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers / / edited by François-Xavier Standaert, Elisabeth Oswald
Constructive Side-Channel Analysis and Secure Design [[electronic resource] ] : 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers / / edited by François-Xavier Standaert, Elisabeth Oswald
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 219 p. 74 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Algorithms
Computer science—Mathematics
Computer hardware
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Computer Hardware
ISBN 3-319-43283-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Physical Attacks -- Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption -- Co-location detection on the Cloud -- Simple Photonic Emission Attack with Reduced Data Complexity -- Side-Channel Analysis (case studies) -- Power Analysis Attacks against IEEE 802.15.4 Node -- Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series -- Dismantling real-world ECC with Horizontal and Vertical Template Attacks -- Fault Analysis -- Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT -- Improved Differential Fault Analysis on Camellia-128 -- A Note on the Security of CHES 2014 Symmetric Infective Countermeasure -- Side-Channel Analysis (tools) -- Simpler, Faster, and More Robust T-test Based Leakage Detection -- Design and implementation of a waveform-matching based triggering system -- Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order.
Record Nr. UNISA-996465970503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Constructive Side-Channel Analysis and Secure Design : 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers / / edited by François-Xavier Standaert, Elisabeth Oswald
Constructive Side-Channel Analysis and Secure Design : 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers / / edited by François-Xavier Standaert, Elisabeth Oswald
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 219 p. 74 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Algorithms
Computer science—Mathematics
Computer hardware
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Computer Hardware
ISBN 3-319-43283-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Physical Attacks -- Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption -- Co-location detection on the Cloud -- Simple Photonic Emission Attack with Reduced Data Complexity -- Side-Channel Analysis (case studies) -- Power Analysis Attacks against IEEE 802.15.4 Node -- Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series -- Dismantling real-world ECC with Horizontal and Vertical Template Attacks -- Fault Analysis -- Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT -- Improved Differential Fault Analysis on Camellia-128 -- A Note on the Security of CHES 2014 Symmetric Infective Countermeasure -- Side-Channel Analysis (tools) -- Simpler, Faster, and More Robust T-test Based Leakage Detection -- Design and implementation of a waveform-matching based triggering system -- Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order.
Record Nr. UNINA-9910484728403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptographic ahrdware and embedded systems, CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings / / Edited by Elisabeth Oswald and Pankaj Rohatgi
Cryptographic ahrdware and embedded systems, CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings / / Edited by Elisabeth Oswald and Pankaj Rohatgi
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XIII, 445 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer science
Computers, Special purpose
Computer networks
ISBN 3-540-85053-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Side-Channel Analysis 1 -- Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform -- Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs -- Multiple-Differential Side-Channel Collision Attacks on AES -- Implementations 1 -- Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves? -- Ultra High Performance ECC over NIST Primes on Commercial FPGAs -- Exploiting the Power of GPUs for Asymmetric Cryptography -- Fault Analysis 1 -- High-Performance Concurrent Error Detection Scheme for AES Hardware -- A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis -- RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks -- Random Number Generation -- A Design for a Physical RNG with Robust Entropy Estimators -- Fast Digital TRNG Based on Metastable Ring Oscillator -- Efficient Helper Data Key Extractor on FPGAs -- Side-Channel Analysis 2 -- The Carry Leakage on the Randomized Exponent Countermeasure -- Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths -- Attacking State-of-the-Art Software Countermeasures—A Case Study for AES -- Cryptography and Cryptanalysis -- Binary Edwards Curves -- A Real-World Attack Breaking A5/1 within Hours -- Hash Functions and RFID Tags: Mind the Gap -- Implementations 2 -- A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases -- A Very Compact Hardware Implementation of the MISTY1 Block Cipher -- Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography -- Fault Analysis 2 -- Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration -- RFID and Its Vulnerability to Faults -- Perturbating RSA Public Keys: An Improved Attack -- Side-Channel Analysis 3 -- Divided Backend Duplication Methodology for Balanced Dual Rail Routing -- Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages -- Mutual Information Analysis -- Invited Talks -- RSA—Past, Present, Future -- A Vision for Platform Security.
Record Nr. UNISA-996465829003316
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptographic ahrdware and embedded systems, CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings / / Edited by Elisabeth Oswald and Pankaj Rohatgi
Cryptographic ahrdware and embedded systems, CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings / / Edited by Elisabeth Oswald and Pankaj Rohatgi
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XIII, 445 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer science
Computers, Special purpose
Computer networks
ISBN 3-540-85053-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Side-Channel Analysis 1 -- Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform -- Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs -- Multiple-Differential Side-Channel Collision Attacks on AES -- Implementations 1 -- Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves? -- Ultra High Performance ECC over NIST Primes on Commercial FPGAs -- Exploiting the Power of GPUs for Asymmetric Cryptography -- Fault Analysis 1 -- High-Performance Concurrent Error Detection Scheme for AES Hardware -- A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis -- RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks -- Random Number Generation -- A Design for a Physical RNG with Robust Entropy Estimators -- Fast Digital TRNG Based on Metastable Ring Oscillator -- Efficient Helper Data Key Extractor on FPGAs -- Side-Channel Analysis 2 -- The Carry Leakage on the Randomized Exponent Countermeasure -- Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths -- Attacking State-of-the-Art Software Countermeasures—A Case Study for AES -- Cryptography and Cryptanalysis -- Binary Edwards Curves -- A Real-World Attack Breaking A5/1 within Hours -- Hash Functions and RFID Tags: Mind the Gap -- Implementations 2 -- A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases -- A Very Compact Hardware Implementation of the MISTY1 Block Cipher -- Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography -- Fault Analysis 2 -- Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration -- RFID and Its Vulnerability to Faults -- Perturbating RSA Public Keys: An Improved Attack -- Side-Channel Analysis 3 -- Divided Backend Duplication Methodology for Balanced Dual Rail Routing -- Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages -- Mutual Information Analysis -- Invited Talks -- RSA—Past, Present, Future -- A Vision for Platform Security.
Record Nr. UNINA-9910484022703321
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui