top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Interactions between Group Theory, Symmetry and Cryptology
Interactions between Group Theory, Symmetry and Cryptology
Autore González Vasco María Isabel
Pubbl/distr/stampa MDPI - Multidisciplinary Digital Publishing Institute, 2020
Descrizione fisica 1 online resource (164 p.)
Soggetto non controllato algebraic-geometry code
algorithms in groups
alternating group
Berlekamp-Massey algorithm
beyond birthday bound
block cipher
braid groups
cryptanalysis
cryptography
digital signatures
Engel words
error-correcting code
euclidean algorithm
generalized self-shrinking generator
group key establishment
group theory
group-based cryptography
ideal cipher model
key agreement protocol
key equation
lightweight cryptography
non-commutative cryptography
NP-Completeness
numerical semigroup
one-way functions
permutation group
post-quantum cryptography
protocol compiler
provable security
pseudo-random number generator
pseudorandom permutation
Reed-Solomon codes
semigroup ideal
statistical randomness tests
Sugiyama et al. algorithm
symmetry
t-modified self-shrinking generator
WalnutDSA
Weierstrass semigroup
ISBN 3-03928-803-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910404086703321
González Vasco María Isabel  
MDPI - Multidisciplinary Digital Publishing Institute, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Side Channel Attacks / Seokhie Hong
Side Channel Attacks / Seokhie Hong
Autore Hong Seokhie
Pubbl/distr/stampa MDPI - Multidisciplinary Digital Publishing Institute, 2019
Descrizione fisica 1 electronic resource (258 p.)
Soggetto topico History of engineering and technology
Soggetto non controllato binary Huff curve
FPGA
post quantum cryptography
data loss
side-channel cache attacks
rsa cryptosystem
first-order analysis
chaotic circuit
integrity
ad libraries
power-analysis attack
single trace analysis
side-channel authentication
provable security
ad lib
cache misses
cache side-channel attack
leakage model
NTRU
graph
AES
hardware security
recovery of secret exponent by triangular trace analysis
side-channel attacks
information leakage
data outsourcing
CPLD
scatter-gather implementation
modular exponentiation
lattice-based cryptography
elliptic curve cryptography
Gaussian sampling
post-quantum cryptography
reliability
unified point addition
ad networks
graph similarity
mobile ads
physically unclonable function
tweakable block cipher
Merkle (hash) tree
machine-learning classification
side channel attack
online authentication
side channel analysis
financial IC card
side-channel attack
re-keying
cloud computing
cryptographic keys
chaos theory
horizontal collision correlation analysis
countermeasure
embedded system security
cache attack
single-trace attack
software development kit (SDK)
CDT sampling
key bit-dependent attack
side-channel analysis
second-order analysis
constant-time cryptographic algorithm
android package (APK)
challenge-response authentication
ISBN 9783039210015
3039210017
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910346673703321
Hong Seokhie  
MDPI - Multidisciplinary Digital Publishing Institute, 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui