Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle
| Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle |
| Autore | Zheng Zhiyong |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | 2022 |
| Descrizione fisica | 1 electronic resource (191 p.) |
| Altri autori (Persone) |
TianKun
LiuFengxia |
| Collana | Financial Mathematics and Fintech |
| Soggetto topico |
Macroeconomics
Applied mathematics |
| Soggetto non controllato |
Post-Quantum Cryptography
Gauss Lattice Reduction Learning With Errors FHE Fourier transform Ideal lattice NTRU Smoothing parameters Discrete Gaussian measure |
| Classificazione | BUS039000MAT003000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Modern Crytography Volume Two |
| Record Nr. | UNINA-9910633996003321 |
Zheng Zhiyong
|
||
| 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Side Channel Attacks / Seokhie Hong
| Side Channel Attacks / Seokhie Hong |
| Autore | Hong Seokhie |
| Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2019 |
| Descrizione fisica | 1 electronic resource (258 p.) |
| Soggetto topico | History of engineering and technology |
| Soggetto non controllato |
binary Huff curve
FPGA post quantum cryptography data loss side-channel cache attacks rsa cryptosystem first-order analysis chaotic circuit integrity ad libraries power-analysis attack single trace analysis side-channel authentication provable security ad lib cache misses cache side-channel attack leakage model NTRU graph AES hardware security recovery of secret exponent by triangular trace analysis side-channel attacks information leakage data outsourcing CPLD scatter-gather implementation modular exponentiation lattice-based cryptography elliptic curve cryptography Gaussian sampling post-quantum cryptography reliability unified point addition ad networks graph similarity mobile ads physically unclonable function tweakable block cipher Merkle (hash) tree machine-learning classification side channel attack online authentication side channel analysis financial IC card side-channel attack re-keying cloud computing cryptographic keys chaos theory horizontal collision correlation analysis countermeasure embedded system security cache attack single-trace attack software development kit (SDK) CDT sampling key bit-dependent attack side-channel analysis second-order analysis constant-time cryptographic algorithm android package (APK) challenge-response authentication |
| ISBN |
9783039210015
3039210017 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910346673703321 |
Hong Seokhie
|
||
| MDPI - Multidisciplinary Digital Publishing Institute, 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||