Interactions between Group Theory, Symmetry and Cryptology
| Interactions between Group Theory, Symmetry and Cryptology |
| Autore | González Vasco María Isabel |
| Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2020 |
| Descrizione fisica | 1 online resource (164 p.) |
| Soggetto non controllato |
algebraic-geometry code
algorithms in groups alternating group Berlekamp-Massey algorithm beyond birthday bound block cipher braid groups cryptanalysis cryptography digital signatures Engel words error-correcting code euclidean algorithm generalized self-shrinking generator group key establishment group theory group-based cryptography ideal cipher model key agreement protocol key equation lightweight cryptography non-commutative cryptography NP-Completeness numerical semigroup one-way functions permutation group post-quantum cryptography protocol compiler provable security pseudo-random number generator pseudorandom permutation Reed-Solomon codes semigroup ideal statistical randomness tests Sugiyama et al. algorithm symmetry t-modified self-shrinking generator WalnutDSA Weierstrass semigroup |
| ISBN | 3-03928-803-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910404086703321 |
González Vasco María Isabel
|
||
| MDPI - Multidisciplinary Digital Publishing Institute, 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Side Channel Attacks / Seokhie Hong
| Side Channel Attacks / Seokhie Hong |
| Autore | Hong Seokhie |
| Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2019 |
| Descrizione fisica | 1 electronic resource (258 p.) |
| Soggetto topico | History of engineering and technology |
| Soggetto non controllato |
binary Huff curve
FPGA post quantum cryptography data loss side-channel cache attacks rsa cryptosystem first-order analysis chaotic circuit integrity ad libraries power-analysis attack single trace analysis side-channel authentication provable security ad lib cache misses cache side-channel attack leakage model NTRU graph AES hardware security recovery of secret exponent by triangular trace analysis side-channel attacks information leakage data outsourcing CPLD scatter-gather implementation modular exponentiation lattice-based cryptography elliptic curve cryptography Gaussian sampling post-quantum cryptography reliability unified point addition ad networks graph similarity mobile ads physically unclonable function tweakable block cipher Merkle (hash) tree machine-learning classification side channel attack online authentication side channel analysis financial IC card side-channel attack re-keying cloud computing cryptographic keys chaos theory horizontal collision correlation analysis countermeasure embedded system security cache attack single-trace attack software development kit (SDK) CDT sampling key bit-dependent attack side-channel analysis second-order analysis constant-time cryptographic algorithm android package (APK) challenge-response authentication |
| ISBN |
9783039210015
3039210017 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910346673703321 |
Hong Seokhie
|
||
| MDPI - Multidisciplinary Digital Publishing Institute, 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||