top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Interactions between Group Theory, Symmetry and Cryptology
Interactions between Group Theory, Symmetry and Cryptology
Autore González Vasco María Isabel
Pubbl/distr/stampa MDPI - Multidisciplinary Digital Publishing Institute, 2020
Descrizione fisica 1 electronic resource (164 p.)
Soggetto non controllato NP-Completeness
protocol compiler
post-quantum cryptography
Reed–Solomon codes
key equation
euclidean algorithm
permutation group
t-modified self-shrinking generator
ideal cipher model
algorithms in groups
lightweight cryptography
generalized self-shrinking generator
numerical semigroup
pseudo-random number generator
symmetry
pseudorandom permutation
Berlekamp–Massey algorithm
semigroup ideal
algebraic-geometry code
non-commutative cryptography
provable security
Engel words
block cipher
cryptography
beyond birthday bound
Weierstrass semigroup
group theory
braid groups
statistical randomness tests
group-based cryptography
alternating group
WalnutDSA
Sugiyama et al. algorithm
cryptanalysis
digital signatures
one-way functions
key agreement protocol
error-correcting code
group key establishment
ISBN 3-03928-803-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910404086703321
González Vasco María Isabel  
MDPI - Multidisciplinary Digital Publishing Institute, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Side Channel Attacks
Side Channel Attacks
Autore Hong Seokhie
Pubbl/distr/stampa MDPI - Multidisciplinary Digital Publishing Institute, 2019
Descrizione fisica 1 electronic resource (258 p.)
Soggetto non controllato binary Huff curve
FPGA
post quantum cryptography
data loss
side-channel cache attacks
rsa cryptosystem
first-order analysis
chaotic circuit
integrity
ad libraries
power-analysis attack
single trace analysis
side-channel authentication
provable security
ad lib
cache misses
cache side-channel attack
leakage model
NTRU
graph
AES
hardware security
recovery of secret exponent by triangular trace analysis
side-channel attacks
information leakage
data outsourcing
CPLD
scatter-gather implementation
modular exponentiation
lattice-based cryptography
elliptic curve cryptography
Gaussian sampling
post-quantum cryptography
reliability
unified point addition
ad networks
graph similarity
mobile ads
physically unclonable function
tweakable block cipher
Merkle (hash) tree
machine-learning classification
side channel attack
online authentication
side channel analysis
financial IC card
side-channel attack
re-keying
cloud computing
cryptographic keys
chaos theory
horizontal collision correlation analysis
countermeasure
embedded system security
cache attack
single-trace attack
software development kit (SDK)
CDT sampling
key bit-dependent attack
side-channel analysis
second-order analysis
constant-time cryptographic algorithm
android package (APK)
challenge-response authentication
ISBN 3-03921-001-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910346673703321
Hong Seokhie  
MDPI - Multidisciplinary Digital Publishing Institute, 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui