top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptographic ahrdware and embedded systems, CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings / / Edited by Elisabeth Oswald and Pankaj Rohatgi
Cryptographic ahrdware and embedded systems, CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings / / Edited by Elisabeth Oswald and Pankaj Rohatgi
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XIII, 445 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer science
Computers, Special purpose
Computer networks
ISBN 3-540-85053-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Side-Channel Analysis 1 -- Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform -- Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs -- Multiple-Differential Side-Channel Collision Attacks on AES -- Implementations 1 -- Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves? -- Ultra High Performance ECC over NIST Primes on Commercial FPGAs -- Exploiting the Power of GPUs for Asymmetric Cryptography -- Fault Analysis 1 -- High-Performance Concurrent Error Detection Scheme for AES Hardware -- A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis -- RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks -- Random Number Generation -- A Design for a Physical RNG with Robust Entropy Estimators -- Fast Digital TRNG Based on Metastable Ring Oscillator -- Efficient Helper Data Key Extractor on FPGAs -- Side-Channel Analysis 2 -- The Carry Leakage on the Randomized Exponent Countermeasure -- Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths -- Attacking State-of-the-Art Software Countermeasures—A Case Study for AES -- Cryptography and Cryptanalysis -- Binary Edwards Curves -- A Real-World Attack Breaking A5/1 within Hours -- Hash Functions and RFID Tags: Mind the Gap -- Implementations 2 -- A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases -- A Very Compact Hardware Implementation of the MISTY1 Block Cipher -- Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography -- Fault Analysis 2 -- Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration -- RFID and Its Vulnerability to Faults -- Perturbating RSA Public Keys: An Improved Attack -- Side-Channel Analysis 3 -- Divided Backend Duplication Methodology for Balanced Dual Rail Routing -- Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages -- Mutual Information Analysis -- Invited Talks -- RSA—Past, Present, Future -- A Vision for Platform Security.
Record Nr. UNISA-996465829003316
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptographic ahrdware and embedded systems, CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings / / Edited by Elisabeth Oswald and Pankaj Rohatgi
Cryptographic ahrdware and embedded systems, CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings / / Edited by Elisabeth Oswald and Pankaj Rohatgi
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XIII, 445 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer science
Computers, Special purpose
Computer networks
ISBN 3-540-85053-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Side-Channel Analysis 1 -- Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform -- Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs -- Multiple-Differential Side-Channel Collision Attacks on AES -- Implementations 1 -- Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves? -- Ultra High Performance ECC over NIST Primes on Commercial FPGAs -- Exploiting the Power of GPUs for Asymmetric Cryptography -- Fault Analysis 1 -- High-Performance Concurrent Error Detection Scheme for AES Hardware -- A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis -- RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks -- Random Number Generation -- A Design for a Physical RNG with Robust Entropy Estimators -- Fast Digital TRNG Based on Metastable Ring Oscillator -- Efficient Helper Data Key Extractor on FPGAs -- Side-Channel Analysis 2 -- The Carry Leakage on the Randomized Exponent Countermeasure -- Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths -- Attacking State-of-the-Art Software Countermeasures—A Case Study for AES -- Cryptography and Cryptanalysis -- Binary Edwards Curves -- A Real-World Attack Breaking A5/1 within Hours -- Hash Functions and RFID Tags: Mind the Gap -- Implementations 2 -- A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases -- A Very Compact Hardware Implementation of the MISTY1 Block Cipher -- Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography -- Fault Analysis 2 -- Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration -- RFID and Its Vulnerability to Faults -- Perturbating RSA Public Keys: An Improved Attack -- Side-Channel Analysis 3 -- Divided Backend Duplication Methodology for Balanced Dual Rail Routing -- Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages -- Mutual Information Analysis -- Invited Talks -- RSA—Past, Present, Future -- A Vision for Platform Security.
Record Nr. UNINA-9910484022703321
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Card Research and Advanced Applications [[electronic resource] ] : 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers / / edited by Aurélien Francillon, Pankaj Rohatgi
Smart Card Research and Advanced Applications [[electronic resource] ] : 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers / / edited by Aurélien Francillon, Pankaj Rohatgi
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 271 p. 111 illus.)
Disciplina 332.76
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Cryptology
Systems and Data Security
Management of Computing and Information Systems
ISBN 3-319-08302-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security technologies -- Attacks on masking -- Side channel attacks -- Software and protocol analysis -- Side channel countermeasures.- Side channel and fault attacks.
Record Nr. UNISA-996199994303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart Card Research and Advanced Applications : 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers / / edited by Aurélien Francillon, Pankaj Rohatgi
Smart Card Research and Advanced Applications : 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers / / edited by Aurélien Francillon, Pankaj Rohatgi
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 271 p. 111 illus.)
Disciplina 332.76
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Cryptology
Systems and Data Security
Management of Computing and Information Systems
ISBN 3-319-08302-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security technologies -- Attacks on masking -- Side channel attacks -- Software and protocol analysis -- Side channel countermeasures.- Side channel and fault attacks.
Record Nr. UNINA-9910483455703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui