top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings / / Pascal Paillier, Ingrid Verbauwhede (eds.)
Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings / / Pascal Paillier, Ingrid Verbauwhede (eds.)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 468 p.)
Disciplina 004.16
Collana Security and Cryptology
Soggetto topico Embedded computer systems
Computer security
Cryptography
ISBN 3-540-74735-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Differential and Higher Order Attacks -- A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter -- Gaussian Mixture Models for Higher-Order Side Channel Analysis -- Side Channel Cryptanalysis of a Higher Order Masking Scheme -- Random Number Generation and Device Identification -- High-Speed True Random Number Generation with Logic Gates Only -- FPGA Intrinsic PUFs and Their Use for IP Protection -- Logic Styles: Masking and Routing -- Evaluation of the Masked Logic Style MDPL on a Prototype Chip -- Masking and Dual-Rail Logic Don’t Add Up -- DPA-Resistance Without Routing Constraints? -- Efficient Algorithms for Embedded Processors -- On the Power of Bitslice Implementation on Intel Core2 Processor -- Highly Regular Right-to-Left Algorithms for Scalar Multiplication -- MAME: A Compression Function with Reduced Hardware Requirements -- Collision Attacks and Fault Analysis -- Collision Attacks on AES-Based MAC: Alpha-MAC -- Secret External Encodings Do Not Prevent Transient Fault Analysis -- Two New Techniques of Side-Channel Cryptanalysis -- High Speed AES Implementations -- AES Encryption Implementation and Analysis on Commodity Graphics Processing Units -- Multi-gigabit GCM-AES Architecture Optimized for FPGAs -- Public-Key Cryptography -- Arithmetic Operators for Pairing-Based Cryptography -- FPGA Design of Self-certified Signature Verification on Koblitz Curves -- How to Maximize the Potential of FPGA Resources for Modular Exponentiation -- Implementation Cost of Countermeasures -- TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks -- Power Analysis Resistant AES Implementation with Instruction Set Extensions -- Security Issues for RF and RFID -- Power and EM Attacks on Passive RFID Devices -- RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? -- RF-DNA: Radio-Frequency Certificates of Authenticity -- Special Purpose Hardware for Cryptanalysis -- CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method -- Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA -- A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations -- Side Channel Analysis -- Differential Behavioral Analysis -- Information Theoretic Evaluation of Side-Channel Resistant Logic Styles -- Problems and Solutions for Lightweight Devices -- On the Implementation of a Fast Prime Generation Algorithm -- PRESENT: An Ultra-Lightweight Block Cipher -- Cryptographic Hardware and Embedded Systems - CHES 2007.
Record Nr. UNINA-9910484964003321
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings / / Pascal Paillier, Ingrid Verbauwhede (eds.)
Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings / / Pascal Paillier, Ingrid Verbauwhede (eds.)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 468 p.)
Disciplina 004.16
Collana Security and Cryptology
Soggetto topico Embedded computer systems
Computer security
Cryptography
ISBN 3-540-74735-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Differential and Higher Order Attacks -- A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter -- Gaussian Mixture Models for Higher-Order Side Channel Analysis -- Side Channel Cryptanalysis of a Higher Order Masking Scheme -- Random Number Generation and Device Identification -- High-Speed True Random Number Generation with Logic Gates Only -- FPGA Intrinsic PUFs and Their Use for IP Protection -- Logic Styles: Masking and Routing -- Evaluation of the Masked Logic Style MDPL on a Prototype Chip -- Masking and Dual-Rail Logic Don’t Add Up -- DPA-Resistance Without Routing Constraints? -- Efficient Algorithms for Embedded Processors -- On the Power of Bitslice Implementation on Intel Core2 Processor -- Highly Regular Right-to-Left Algorithms for Scalar Multiplication -- MAME: A Compression Function with Reduced Hardware Requirements -- Collision Attacks and Fault Analysis -- Collision Attacks on AES-Based MAC: Alpha-MAC -- Secret External Encodings Do Not Prevent Transient Fault Analysis -- Two New Techniques of Side-Channel Cryptanalysis -- High Speed AES Implementations -- AES Encryption Implementation and Analysis on Commodity Graphics Processing Units -- Multi-gigabit GCM-AES Architecture Optimized for FPGAs -- Public-Key Cryptography -- Arithmetic Operators for Pairing-Based Cryptography -- FPGA Design of Self-certified Signature Verification on Koblitz Curves -- How to Maximize the Potential of FPGA Resources for Modular Exponentiation -- Implementation Cost of Countermeasures -- TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks -- Power Analysis Resistant AES Implementation with Instruction Set Extensions -- Security Issues for RF and RFID -- Power and EM Attacks on Passive RFID Devices -- RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? -- RF-DNA: Radio-Frequency Certificates of Authenticity -- Special Purpose Hardware for Cryptanalysis -- CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method -- Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA -- A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations -- Side Channel Analysis -- Differential Behavioral Analysis -- Information Theoretic Evaluation of Side-Channel Resistant Logic Styles -- Problems and Solutions for Lightweight Devices -- On the Implementation of a Fast Prime Generation Algorithm -- PRESENT: An Ultra-Lightweight Block Cipher -- Cryptographic Hardware and Embedded Systems - CHES 2007.
Record Nr. UNISA-996465829403316
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security, Cryptology, and Machine Learning [[electronic resource] ] : 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29–30, 2023, Proceedings / / edited by Shlomi Dolev, Ehud Gudes, Pascal Paillier
Cyber Security, Cryptology, and Machine Learning [[electronic resource] ] : 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29–30, 2023, Proceedings / / edited by Shlomi Dolev, Ehud Gudes, Pascal Paillier
Autore Dolev Shlomi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (539 pages)
Disciplina 005.8
Altri autori (Persone) GudesEhud
PaillierPascal
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Application software
Computer networks
Machine learning
Cryptography
Data encryption (Computer science)
Data and Information Security
Computer and Information Systems Applications
Computer Communication Networks
Machine Learning
Cryptology
ISBN 3-031-34671-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Localhost Detour from Public to Private Networks -- Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation -- Efficient Extended GCD and Class Groups from Secure Integer Arithmetic -- On Distributed Randomness Generation in Blockchains -- Efficient Skip Connections Realization for Secure Inference on Encrypted Data -- Single Instance Self-Masking via Permutations A Fusion-Based Framework for Unsupervised Single Image Super-Resolution -- Generating One-Hot Maps under Encryption Building blocks for LSTM homomorphic evaluation with TFHE -- CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks -- Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel -- A Bag of Tokens Neural Network to Predict Webpage Age -- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations (Short Paper) -- PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image -- Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO -- The use of Performance-Counters to perform side-channel attacks -- HAMLET: A Transformer Based Approach for Money Laundering Detection -- Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks -- Practical Improvements on BKZ Algorithm -- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction -- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks -- New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic -- How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs -- Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks -- On adaptively secure prefix encryption under LWE SigML: Supervised Log Anomaly with Fully Homomorphic Encryption -- HBSS: (Simple) Hash-Based Stateless Signatures -- Hash all the way to the Rescue -- Improving Performance in Space-Hard Algorithms -- A survey of security challenges in Automatic Identification System (AIS) Protocol -- A new interpretation for the GHASH authenticator of AES-GCM -- Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off -- Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks -- Midgame Attacks and Defense Against Them -- Deep Neural Networks for Encrypted Inference with TFHE -- On the existence of highly organized communities in networks of locally interacting agents -- Patch or Exploit? NVD Assisted Classification of Vulnerability-Related Github Pages.
Record Nr. UNISA-996538666003316
Dolev Shlomi  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security, Cryptology, and Machine Learning : 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29–30, 2023, Proceedings / / edited by Shlomi Dolev, Ehud Gudes, Pascal Paillier
Cyber Security, Cryptology, and Machine Learning : 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29–30, 2023, Proceedings / / edited by Shlomi Dolev, Ehud Gudes, Pascal Paillier
Autore Dolev Shlomi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (539 pages)
Disciplina 005.8
Altri autori (Persone) GudesEhud
PaillierPascal
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Application software
Computer networks
Machine learning
Cryptography
Data encryption (Computer science)
Data and Information Security
Computer and Information Systems Applications
Computer Communication Networks
Machine Learning
Cryptology
ISBN 3-031-34671-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Localhost Detour from Public to Private Networks -- Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation -- Efficient Extended GCD and Class Groups from Secure Integer Arithmetic -- On Distributed Randomness Generation in Blockchains -- Efficient Skip Connections Realization for Secure Inference on Encrypted Data -- Single Instance Self-Masking via Permutations A Fusion-Based Framework for Unsupervised Single Image Super-Resolution -- Generating One-Hot Maps under Encryption Building blocks for LSTM homomorphic evaluation with TFHE -- CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks -- Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel -- A Bag of Tokens Neural Network to Predict Webpage Age -- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations (Short Paper) -- PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image -- Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO -- The use of Performance-Counters to perform side-channel attacks -- HAMLET: A Transformer Based Approach for Money Laundering Detection -- Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks -- Practical Improvements on BKZ Algorithm -- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction -- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks -- New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic -- How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs -- Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks -- On adaptively secure prefix encryption under LWE SigML: Supervised Log Anomaly with Fully Homomorphic Encryption -- HBSS: (Simple) Hash-Based Stateless Signatures -- Hash all the way to the Rescue -- Improving Performance in Space-Hard Algorithms -- A survey of security challenges in Automatic Identification System (AIS) Protocol -- A new interpretation for the GHASH authenticator of AES-GCM -- Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off -- Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks -- Midgame Attacks and Defense Against Them -- Deep Neural Networks for Encrypted Inference with TFHE -- On the existence of highly organized communities in networks of locally interacting agents -- Patch or Exploit? NVD Assisted Classification of Vulnerability-Related Github Pages.
Record Nr. UNINA-9910734855503321
Dolev Shlomi  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public Key Cryptography [[electronic resource] ] : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12–14, 2002 Proceedings / / edited by Pascal Paillier, David Naccache
Public Key Cryptography [[electronic resource] ] : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12–14, 2002 Proceedings / / edited by Pascal Paillier, David Naccache
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XI, 384 p. 1 illus.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Algorithms
Computer communication systems
Cryptology
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-45664-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Encryption Schemes -- New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive -- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages -- On Sufficient Randomness for Secure Public-Key Cryptosystems -- Multi-recipient Public-Key Encryption with Shortened Ciphertext -- Signature Schemes -- Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code -- Formal Proofs for the Security of Signcryption -- A Provably Secure Restrictive Partially Blind Signature Scheme -- Protocols I -- M + 1-st Price Auction Using Homomorphic Encryption -- Client/Server Tradeoffs for Online Elections -- Self-tallying Elections and Perfect Ballot Secrecy -- Protocols II -- Efficient 1-Out-n Oblivious Transfer Schemes -- Linear Code Implies Public-Key Traitor Tracing -- Design and Security Analysis of Anonymous Group Identification Protocols -- On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem -- Cryptanalysis -- Solving Underdefined Systems of Multivariate Quadratic Equations -- Selective Forgery of RSA Signatures with Fixed-Pattern Padding -- New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 -- Side Channels -- SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation -- A Combined Timing and Power Attack -- A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks -- Invited Talk -- New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report -- ECC Implementations -- An Improved Method of Multiplication on Certain Elliptic Curves -- An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves -- Weierstraß Elliptic Curves and Side-Channel Attacks -- Applications -- One-Way Cross-Trees and Their Applications -- RSA Key Generation with Verifiable Randomness -- New Minimal Modified Radix-r Representation with Applications to Smart Cards.
Record Nr. UNISA-996465554303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public Key Cryptography : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12–14, 2002 Proceedings / / edited by Pascal Paillier, David Naccache
Public Key Cryptography : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12–14, 2002 Proceedings / / edited by Pascal Paillier, David Naccache
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XI, 384 p. 1 illus.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Algorithms
Computer communication systems
Cryptology
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-45664-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Encryption Schemes -- New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive -- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages -- On Sufficient Randomness for Secure Public-Key Cryptosystems -- Multi-recipient Public-Key Encryption with Shortened Ciphertext -- Signature Schemes -- Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code -- Formal Proofs for the Security of Signcryption -- A Provably Secure Restrictive Partially Blind Signature Scheme -- Protocols I -- M + 1-st Price Auction Using Homomorphic Encryption -- Client/Server Tradeoffs for Online Elections -- Self-tallying Elections and Perfect Ballot Secrecy -- Protocols II -- Efficient 1-Out-n Oblivious Transfer Schemes -- Linear Code Implies Public-Key Traitor Tracing -- Design and Security Analysis of Anonymous Group Identification Protocols -- On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem -- Cryptanalysis -- Solving Underdefined Systems of Multivariate Quadratic Equations -- Selective Forgery of RSA Signatures with Fixed-Pattern Padding -- New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 -- Side Channels -- SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation -- A Combined Timing and Power Attack -- A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks -- Invited Talk -- New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report -- ECC Implementations -- An Improved Method of Multiplication on Certain Elliptic Curves -- An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves -- Weierstraß Elliptic Curves and Side-Channel Attacks -- Applications -- One-Way Cross-Trees and Their Applications -- RSA Key Generation with Verifiable Randomness -- New Minimal Modified Radix-r Representation with Applications to Smart Cards.
Record Nr. UNINA-9910143916203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui