top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Smart Card Research and Advanced Applications : 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers / / edited by Sonia Belaïd, Tim Güneysu
Smart Card Research and Advanced Applications : 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers / / edited by Sonia Belaïd, Tim Güneysu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 269 p. 106 illus., 50 illus. in color.)
Disciplina 005.82
006.246
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Application software
Computer communication systems
Microprogramming 
Cryptology
Systems and Data Security
Information Systems Applications (incl. Internet)
Computer Communication Networks
Control Structures and Microprogramming
ISBN 3-030-42068-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto System-on-a-Chip Security -- In-situ Extraction of Randomness from Computer Architecture through Hardware Performance Counters -- Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Latency and Low-Energy Applications -- Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance -- Post-Quantum Cryptography -- Improving Speed of Dilithium's Signing Procedure -- An efficient and provable masked implementation of qtesla -- Side-Channel Analysis -- Side-channel attacks on blinded scalar multiplications revisited -- Remote Side-Channel Attacks on Heterogeneous SoC -- Optimal Collision Side-Channel Attacks -- Microarchitectural Attacks -- A Bit-Level Approach to Side Channel Based Disassembling -- CCCiCC: A Cross-core Cache-independent Covert Channel on AMD Family 15h CPUs -- Design Considerations for EM Pulse Fault Injection -- Cryptographic Primitives -- Lightweight MACs from Universal Hash Functions -- FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms -- Advances in Side-Channel Analysis -- A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis -- Key Enumeration from the Adversarial Viewpoint. When to Stop Measuring and Start Enumerating?.
Record Nr. UNINA-9910410056003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Card Research and Advanced Applications [[electronic resource] ] : 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers / / edited by Begül Bilgin, Jean-Bernard Fischer
Smart Card Research and Advanced Applications [[electronic resource] ] : 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers / / edited by Begül Bilgin, Jean-Bernard Fischer
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 201 p. 135 illus., 59 illus. in color.)
Disciplina 006.246
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Cryptology
Systems and Data Security
ISBN 3-030-15462-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Convolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations -- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES -- Improving Side-channel Analysis through Semi-supervised Learning -- Non-profiled Mask Recovery: the impact of Independent Component Analysis -- How (not) to Use Welch’s T-test in Side-Channel Security Evaluations -- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys -- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M -- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication -- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs -- Electromagnetic Activity vs. Logical Activity : Near Field Scans for Reverse Engineering -- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P -- Breaking all the Things — A Systematic Survey of Firmware Extraction Techniques for IoT Devices -- Exploiting JCVM on smart cards using forged references in the API calls.
Record Nr. UNISA-996466441403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers / / edited by Begül Bilgin, Jean-Bernard Fischer
Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers / / edited by Begül Bilgin, Jean-Bernard Fischer
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 201 p. 135 illus., 59 illus. in color.)
Disciplina 006.246
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Cryptology
Systems and Data Security
ISBN 3-030-15462-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Convolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations -- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES -- Improving Side-channel Analysis through Semi-supervised Learning -- Non-profiled Mask Recovery: the impact of Independent Component Analysis -- How (not) to Use Welch’s T-test in Side-Channel Security Evaluations -- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys -- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M -- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication -- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs -- Electromagnetic Activity vs. Logical Activity : Near Field Scans for Reverse Engineering -- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P -- Breaking all the Things — A Systematic Survey of Firmware Extraction Techniques for IoT Devices -- Exploiting JCVM on smart cards using forged references in the API calls.
Record Nr. UNINA-9910337572803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui