top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) / / Cristiana Bolchini, Ingrid Verbauwhede, Ioana Vatajelu, editors
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) / / Cristiana Bolchini, Ingrid Verbauwhede, Ioana Vatajelu, editors
Pubbl/distr/stampa Piscataway, NJ : , : IEEE, , 2022
Descrizione fisica 1 online resource (1532 pages) : illustrations
Disciplina 620.0042
Soggetto topico Computer-aided design - Congresses
ISBN 3-9819263-6-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2022 Design, Automation & Test in Europe Conference & Exhibition
Record Nr. UNINA-9910571794603321
Piscataway, NJ : , : IEEE, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) / / Cristiana Bolchini, Ingrid Verbauwhede, Ioana Vatajelu, editors
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) / / Cristiana Bolchini, Ingrid Verbauwhede, Ioana Vatajelu, editors
Pubbl/distr/stampa Piscataway, NJ : , : IEEE, , 2022
Descrizione fisica 1 online resource (1532 pages) : illustrations
Disciplina 620.0042
Soggetto topico Computer-aided design - Congresses
ISBN 3-9819263-6-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2022 Design, Automation & Test in Europe Conference & Exhibition
Record Nr. UNISA-996574932703316
Piscataway, NJ : , : IEEE, , 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings / / Pascal Paillier, Ingrid Verbauwhede (eds.)
Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings / / Pascal Paillier, Ingrid Verbauwhede (eds.)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 468 p.)
Disciplina 004.16
Collana Security and Cryptology
Soggetto topico Embedded computer systems
Computer security
Cryptography
ISBN 3-540-74735-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Differential and Higher Order Attacks -- A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter -- Gaussian Mixture Models for Higher-Order Side Channel Analysis -- Side Channel Cryptanalysis of a Higher Order Masking Scheme -- Random Number Generation and Device Identification -- High-Speed True Random Number Generation with Logic Gates Only -- FPGA Intrinsic PUFs and Their Use for IP Protection -- Logic Styles: Masking and Routing -- Evaluation of the Masked Logic Style MDPL on a Prototype Chip -- Masking and Dual-Rail Logic Don’t Add Up -- DPA-Resistance Without Routing Constraints? -- Efficient Algorithms for Embedded Processors -- On the Power of Bitslice Implementation on Intel Core2 Processor -- Highly Regular Right-to-Left Algorithms for Scalar Multiplication -- MAME: A Compression Function with Reduced Hardware Requirements -- Collision Attacks and Fault Analysis -- Collision Attacks on AES-Based MAC: Alpha-MAC -- Secret External Encodings Do Not Prevent Transient Fault Analysis -- Two New Techniques of Side-Channel Cryptanalysis -- High Speed AES Implementations -- AES Encryption Implementation and Analysis on Commodity Graphics Processing Units -- Multi-gigabit GCM-AES Architecture Optimized for FPGAs -- Public-Key Cryptography -- Arithmetic Operators for Pairing-Based Cryptography -- FPGA Design of Self-certified Signature Verification on Koblitz Curves -- How to Maximize the Potential of FPGA Resources for Modular Exponentiation -- Implementation Cost of Countermeasures -- TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks -- Power Analysis Resistant AES Implementation with Instruction Set Extensions -- Security Issues for RF and RFID -- Power and EM Attacks on Passive RFID Devices -- RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? -- RF-DNA: Radio-Frequency Certificates of Authenticity -- Special Purpose Hardware for Cryptanalysis -- CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method -- Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA -- A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations -- Side Channel Analysis -- Differential Behavioral Analysis -- Information Theoretic Evaluation of Side-Channel Resistant Logic Styles -- Problems and Solutions for Lightweight Devices -- On the Implementation of a Fast Prime Generation Algorithm -- PRESENT: An Ultra-Lightweight Block Cipher -- Cryptographic Hardware and Embedded Systems - CHES 2007.
Record Nr. UNINA-9910484964003321
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings / / Pascal Paillier, Ingrid Verbauwhede (eds.)
Cryptographic hardware and embedded systems--CHES 2007 : 9th international workshop, Vienna, Austria, September 10-13, 2007 : proceedings / / Pascal Paillier, Ingrid Verbauwhede (eds.)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 468 p.)
Disciplina 004.16
Collana Security and Cryptology
Soggetto topico Embedded computer systems
Computer security
Cryptography
ISBN 3-540-74735-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Differential and Higher Order Attacks -- A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter -- Gaussian Mixture Models for Higher-Order Side Channel Analysis -- Side Channel Cryptanalysis of a Higher Order Masking Scheme -- Random Number Generation and Device Identification -- High-Speed True Random Number Generation with Logic Gates Only -- FPGA Intrinsic PUFs and Their Use for IP Protection -- Logic Styles: Masking and Routing -- Evaluation of the Masked Logic Style MDPL on a Prototype Chip -- Masking and Dual-Rail Logic Don’t Add Up -- DPA-Resistance Without Routing Constraints? -- Efficient Algorithms for Embedded Processors -- On the Power of Bitslice Implementation on Intel Core2 Processor -- Highly Regular Right-to-Left Algorithms for Scalar Multiplication -- MAME: A Compression Function with Reduced Hardware Requirements -- Collision Attacks and Fault Analysis -- Collision Attacks on AES-Based MAC: Alpha-MAC -- Secret External Encodings Do Not Prevent Transient Fault Analysis -- Two New Techniques of Side-Channel Cryptanalysis -- High Speed AES Implementations -- AES Encryption Implementation and Analysis on Commodity Graphics Processing Units -- Multi-gigabit GCM-AES Architecture Optimized for FPGAs -- Public-Key Cryptography -- Arithmetic Operators for Pairing-Based Cryptography -- FPGA Design of Self-certified Signature Verification on Koblitz Curves -- How to Maximize the Potential of FPGA Resources for Modular Exponentiation -- Implementation Cost of Countermeasures -- TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks -- Power Analysis Resistant AES Implementation with Instruction Set Extensions -- Security Issues for RF and RFID -- Power and EM Attacks on Passive RFID Devices -- RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? -- RF-DNA: Radio-Frequency Certificates of Authenticity -- Special Purpose Hardware for Cryptanalysis -- CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method -- Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA -- A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations -- Side Channel Analysis -- Differential Behavioral Analysis -- Information Theoretic Evaluation of Side-Channel Resistant Logic Styles -- Problems and Solutions for Lightweight Devices -- On the Implementation of a Fast Prime Generation Algorithm -- PRESENT: An Ultra-Lightweight Block Cipher -- Cryptographic Hardware and Embedded Systems - CHES 2007.
Record Nr. UNISA-996465829403316
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Lattice-Based Public-Key Cryptography in Hardware / / by Sujoy Sinha Roy, Ingrid Verbauwhede
Lattice-Based Public-Key Cryptography in Hardware / / by Sujoy Sinha Roy, Ingrid Verbauwhede
Autore Sinha Roy Sujoy
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XV, 101 p. 17 illus., 9 illus. in color.)
Disciplina 621.3815
Collana Computer Architecture and Design Methodologies
Soggetto topico Electronic circuits
Data encryption (Computer science)
Algebra
Ordered algebraic structures
Circuits and Systems
Cryptology
Order, Lattices, Ordered Algebraic Structures
ISBN 981-329-994-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Background -- Discrete Gaussian Sampling -- Ring-LWE Public Key Encryption Processor -- Modular Architecture for Somewhat Homomorphic Function Evaluation -- Recryption-Box Assisted Homomorphic Function Evaluation -- Conclusions and Future Work.
Record Nr. UNINA-9910366618203321
Sinha Roy Sujoy  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Radio Frequency Identification: Security and Privacy Issues [[electronic resource] ] : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers / / edited by Jaap-Henk Hoepman, Ingrid Verbauwhede
Radio Frequency Identification: Security and Privacy Issues [[electronic resource] ] : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers / / edited by Jaap-Henk Hoepman, Ingrid Verbauwhede
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 181 p. 37 illus.)
Disciplina 621.384192
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
E-commerce
Computer communication systems
Special purpose computers
Systems and Data Security
Cryptology
Computer Appl. in Administrative Data Processing
e-Commerce/e-business
Computer Communication Networks
Special Purpose and Application-Based Systems
ISBN 3-642-36139-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On the Security of Tan et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.
Record Nr. UNISA-996466270503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Radio Frequency Identification: Security and Privacy Issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers / / edited by Jaap-Henk Hoepman, Ingrid Verbauwhede
Radio Frequency Identification: Security and Privacy Issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers / / edited by Jaap-Henk Hoepman, Ingrid Verbauwhede
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 181 p. 37 illus.)
Disciplina 621.384192
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
E-commerce
Computer communication systems
Special purpose computers
Systems and Data Security
Cryptology
Computer Appl. in Administrative Data Processing
e-Commerce/e-business
Computer Communication Networks
Special Purpose and Application-Based Systems
ISBN 3-642-36139-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On the Security of Tan et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. et al. Serverless RFID Authentication and Search Protocols -- Yet Another Ultralightweight Authentication Protocol That Is Broken.-  Improved Anonymity for Key-Trees- Hidden Bits Approach for Authentication in RFID Systems.- Designated Attribute-Based Proofs for RFID Applications.- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags.- Private Yoking Proofs: Attacks, Models and New Provable Constructions.- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems.- Weakening Passports through Bad Implementations.- Never Trust a Bunny.- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification.
Record Nr. UNINA-9910739463403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui