top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle
Autore Zheng Zhiyong
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 electronic resource (191 p.)
Altri autori (Persone) TianKun
LiuFengxia
Collana Financial Mathematics and Fintech
Soggetto topico Macroeconomics
Applied mathematics
Soggetto non controllato Post-Quantum Cryptography
Gauss Lattice
Reduction
Learning With Errors
FHE
Fourier transform
Ideal lattice
NTRU
Smoothing parameters
Discrete Gaussian measure
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Modern Crytography Volume Two
Record Nr. UNINA-9910633996003321
Zheng Zhiyong  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Side Channel Attacks
Side Channel Attacks
Autore Hong Seokhie
Pubbl/distr/stampa MDPI - Multidisciplinary Digital Publishing Institute, 2019
Descrizione fisica 1 electronic resource (258 p.)
Soggetto non controllato binary Huff curve
FPGA
post quantum cryptography
data loss
side-channel cache attacks
rsa cryptosystem
first-order analysis
chaotic circuit
integrity
ad libraries
power-analysis attack
single trace analysis
side-channel authentication
provable security
ad lib
cache misses
cache side-channel attack
leakage model
NTRU
graph
AES
hardware security
recovery of secret exponent by triangular trace analysis
side-channel attacks
information leakage
data outsourcing
CPLD
scatter-gather implementation
modular exponentiation
lattice-based cryptography
elliptic curve cryptography
Gaussian sampling
post-quantum cryptography
reliability
unified point addition
ad networks
graph similarity
mobile ads
physically unclonable function
tweakable block cipher
Merkle (hash) tree
machine-learning classification
side channel attack
online authentication
side channel analysis
financial IC card
side-channel attack
re-keying
cloud computing
cryptographic keys
chaos theory
horizontal collision correlation analysis
countermeasure
embedded system security
cache attack
single-trace attack
software development kit (SDK)
CDT sampling
key bit-dependent attack
side-channel analysis
second-order analysis
constant-time cryptographic algorithm
android package (APK)
challenge-response authentication
ISBN 3-03921-001-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910346673703321
Hong Seokhie  
MDPI - Multidisciplinary Digital Publishing Institute, 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui