2010, ISBN: 3642150306
[EAN: 9783642150302], Neubuch, [PU: Springer Berlin Heidelberg], DATENVERARBEITUNG DATENVERSCHLÜSSELUNG, KRYPTOGRAFIE VERSCHLÜSSELUNG INFORMATIONSTHEORIE KRYPTOLOGIE DISKRET (MATHEMATISCH… Plus…
AbeBooks.de moluna, Greven, Germany [73551232] [Rating: 4 (von 5)] NEW BOOK. Frais d'envoiVersandkostenfrei. (EUR 0.00) Details... |
2010, ISBN: 9783642150302
Editor: Mangard, Stefan, Editor: Standaert, Francois-Xavier, Springer, Paperback, Auflage: 2010, 471 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: 3088167… Plus…
amazon.co.uk Frais d'envoiDie angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 5.57) Details... |
2010, ISBN: 9783642150302
Livres de poche
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Up to date resultsFast co… Plus…
booklooker.de |
2010, ISBN: 3642150306
[EAN: 9783642150302], Nouveau livre, [SC: 4.37], [PU: Springer Berlin Heidelberg 2010-07-30, Berlin], Language: ENG, Books
ZVAB.com Blackwell's, Oxford, OX, United Kingdom [8052444] [Note: 5 (sur 5)] NEW BOOK. Frais d'envoi EUR 4.37 Details... |
2010, ISBN: 9783642150302
Livres de poche
12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2010
lehmanns.de Frais d'envoiVersand in 10-14 Tagen. (EUR 9.95) Details... |
2010, ISBN: 3642150306
[EAN: 9783642150302], Neubuch, [PU: Springer Berlin Heidelberg], DATENVERARBEITUNG DATENVERSCHLÜSSELUNG, KRYPTOGRAFIE VERSCHLÜSSELUNG INFORMATIONSTHEORIE KRYPTOLOGIE DISKRET (MATHEMATISCH… Plus…
2010, ISBN: 9783642150302
Editor: Mangard, Stefan, Editor: Standaert, Francois-Xavier, Springer, Paperback, Auflage: 2010, 471 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: 3088167… Plus…
2010
ISBN: 9783642150302
Livres de poche
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Up to date resultsFast co… Plus…
2010, ISBN: 3642150306
[EAN: 9783642150302], Nouveau livre, [SC: 4.37], [PU: Springer Berlin Heidelberg 2010-07-30, Berlin], Language: ENG, Books
2010, ISBN: 9783642150302
Livres de poche
12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2010
Données bibliographiques du meilleur livre correspondant
Auteur: | |
Titre: | |
ISBN: |
Informations détaillées sur le livre - Cryptographic Hardware and Embedded Systems -- CHES 2010
EAN (ISBN-13): 9783642150302
ISBN (ISBN-10): 3642150306
Version reliée
Livre de poche
Date de parution: 2010
Editeur: Springer Berlin
458 Pages
Poids: 0,708 kg
Langue: eng/Englisch
Livre dans la base de données depuis 2009-07-21T07:45:57+02:00 (Paris)
Page de détail modifiée en dernier sur 2023-08-29T09:38:50+02:00 (Paris)
ISBN/EAN: 3642150306
ISBN - Autres types d'écriture:
3-642-15030-6, 978-3-642-15030-2
Autres types d'écriture et termes associés:
Auteur du livre: von francois, standaert, mang, twain mark, martin zoller, jean philippe, alexandre dumas, frank martin, august philippe, frank markus, martin zöller, kuhn august, august kühn, markus held, barbara frank, frank ivan
Titre du livre: crypto 2010, hardware, embedded systems, barbara, ein yankee aus conneticut, santa workshop, proceedings international workshop
Données de l'éditeur
Auteur: Stefan Mangard; Francois-Xavier Standaert
Titre: Lecture Notes in Computer Science; Security and Cryptology; Cryptographic Hardware and Embedded Systems -- CHES 2010 - 12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings
Editeur: Springer; Springer Berlin
458 Pages
Date de parution: 2010-07-30
Berlin; Heidelberg; DE
Langue: Anglais
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 458 p. 142 illus.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; FPGA; algebraic attacks; calculus; collision attack; cryptanalyis; cryptography; elliptic curves; embedded systems; failure analysis; hardware trojan; hash function; power analysis; prime field; pseudo-random numbers; algorithm analysis and problem complexity; Cryptology; Coding and Information Theory; Data Structures and Information Theory; Data and Information Security; Algorithms; Discrete Mathematics in Computer Science; Kryptografie, Verschlüsselungstechnologie; Informationstheorie; Algorithmen und Datenstrukturen; Computersicherheit; Netzwerksicherheit; Mathematik für Informatiker; Diskrete Mathematik; EA
Low Cost Cryptography.- Quark: A Lightweight Hash.- PRINTcipher: A Block Cipher for IC-Printing.- Sponge-Based Pseudo-Random Number Generators.- Efficient Implementations I.- A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over .- Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves.- Efficient Techniques for High-Speed Elliptic Curve Cryptography.- Side-Channel Attacks and Countermeasures I.- Analysis and Improvement of the Random Delay Countermeasure of CHES 2009.- New Results on Instruction Cache Attacks.- Correlation-Enhanced Power Analysis Collision Attack.- Side-Channel Analysis of Six SHA-3 Candidates.- Tamper Resistance and Hardware Trojans.- Flash Memory ‘Bumping’ Attacks.- Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection.- When Failure Analysis Meets Side-Channel Attacks.- Efficient Implementations II.- Fast Exhaustive Search for Polynomial Systems in .- 256 Bit Standardized Crypto for 650 GE – GOST Revisited.- Mixed Bases for Efficient Inversion in and Conversion Matrices of SubBytes of AES.- SHA-3.- Developing a Hardware Evaluation Method for SHA-3 Candidates.- Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs.- Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures.- XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework.- Fault Attacks and Countermeasures.- Public Key Perturbation of Randomized RSA Implementations.- Fault Sensitivity Analysis.- PUFs and RNGs.- An Alternative to Error Correction for SRAM-Like PUFs.- New High Entropy Element for FPGA Based True Random Number Generators.- The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes.-New Designs.- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.- ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware.- Side-Channel Attacks and Countermeasures II.- Provably Secure Higher-Order Masking of AES.- Algebraic Side-Channel Analysis in the Presence of Errors.- Coordinate Blinding over Large Prime Fields.Up to date results Fast conference proceedings State-of-the-art report
Autres livres qui pourraient ressembler au livre recherché:
Dernier livre similaire:
9783642150319 Cryptographic Hardware and Embedded Systems -- CHES 2010 (Stefan Mangard; Francois-Xavier Standaert)
- 9783642150319 Cryptographic Hardware and Embedded Systems -- CHES 2010 (Stefan Mangard; Francois-Xavier Standaert)
- 9783540447092 Cryptographic Hardware and Embedded Systems - CHES 2001 (Cetin K. Koc; David Nacchae; Christof Paar)
- 9783540465614 Cryptographic Hardware and Embedded Systems - CHES 2006 (Louis Goubin; Mitsuru Matsui)
- 9783540425212 Cryptographic Hardware and Embedded Systems - CHES 2001 (Cetin K. Koc)
- 9783540465591 Cryptographic Hardware and Embedded Systems - CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings: 4249 (Lecture Notes in Computer Science, 4249) (Louis Goubin; Mitsuru Matsui)
< pour archiver...