2010, ISBN: 3642150306
[EAN: 9783642150302], Neubuch, [PU: Springer Berlin Heidelberg], DATENVERARBEITUNG DATENVERSCHLÜSSELUNG, KRYPTOGRAFIE VERSCHLÜSSELUNG INFORMATIONSTHEORIE KRYPTOLOGIE DISKRET (MATHEMATISCH… mais…
AbeBooks.de moluna, Greven, Germany [73551232] [Rating: 4 (von 5)] NEW BOOK. Custos de envio:Versandkostenfrei. (EUR 0.00) Details... |
2010, ISBN: 9783642150302
Editor: Mangard, Stefan, Editor: Standaert, Francois-Xavier, Springer, Paperback, Auflage: 2010, 471 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: 3088167… mais…
amazon.co.uk Custos de envio:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 5.57) Details... |
2010, ISBN: 9783642150302
Livro de bolso
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Up to date resultsFast co… mais…
booklooker.de |
2010, ISBN: 3642150306
[EAN: 9783642150302], Nouveau livre, [SC: 4.37], [PU: Springer Berlin Heidelberg 2010-07-30, Berlin], Language: ENG, Books
ZVAB.com Blackwell's, Oxford, OX, United Kingdom [8052444] [Note: 5 (sur 5)] NEW BOOK. Custos de envio: EUR 4.37 Details... |
2010, ISBN: 9783642150302
Livro de bolso
12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2010
lehmanns.de Custos de envio:Versand in 10-14 Tagen. (EUR 9.95) Details... |
2010, ISBN: 3642150306
[EAN: 9783642150302], Neubuch, [PU: Springer Berlin Heidelberg], DATENVERARBEITUNG DATENVERSCHLÜSSELUNG, KRYPTOGRAFIE VERSCHLÜSSELUNG INFORMATIONSTHEORIE KRYPTOLOGIE DISKRET (MATHEMATISCH… mais…
no/na amazon.co.uk
2010, ISBN: 9783642150302
Editor: Mangard, Stefan, Editor: Standaert, Francois-Xavier, Springer, Paperback, Auflage: 2010, 471 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: 3088167… mais…
2010
ISBN: 9783642150302
Livro de bolso
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Up to date resultsFast co… mais…
2010, ISBN: 3642150306
[EAN: 9783642150302], Nouveau livre, [SC: 4.37], [PU: Springer Berlin Heidelberg 2010-07-30, Berlin], Language: ENG, Books
2010, ISBN: 9783642150302
Livro de bolso
12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2010
Dados bibliográficos do melhor livro correspondente
Autor: | |
Título: | |
Número ISBN: |
Dados detalhados do livro - Cryptographic Hardware and Embedded Systems -- CHES 2010
EAN (ISBN-13): 9783642150302
ISBN (ISBN-10): 3642150306
Livro de capa dura
Livro de bolso
Ano de publicação: 2010
Editor/Editora: Springer Berlin
458 Páginas
Peso: 0,708 kg
Língua: eng/Englisch
Livro na base de dados desde 2009-07-21T06:45:57+01:00 (Lisbon)
Página de detalhes modificada pela última vez em 2023-08-29T08:38:50+01:00 (Lisbon)
Número ISBN/EAN: 9783642150302
Número ISBN - Ortografia alternativa:
3-642-15030-6, 978-3-642-15030-2
Ortografia alternativa e termos de pesquisa relacionados:
Autor do livro: von francois, standaert, mang, twain mark, martin zoller, jean philippe, alexandre dumas, frank martin, august philippe, frank markus, martin zöller, kuhn august, august kühn, markus held, barbara frank, frank ivan
Título do livro: crypto 2010, hardware, embedded systems, barbara, ein yankee aus conneticut, santa workshop, proceedings international workshop
Dados da editora
Autor: Stefan Mangard; Francois-Xavier Standaert
Título: Lecture Notes in Computer Science; Security and Cryptology; Cryptographic Hardware and Embedded Systems -- CHES 2010 - 12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings
Editora: Springer; Springer Berlin
458 Páginas
Ano de publicação: 2010-07-30
Berlin; Heidelberg; DE
Língua: Inglês
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 458 p. 142 illus.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; FPGA; algebraic attacks; calculus; collision attack; cryptanalyis; cryptography; elliptic curves; embedded systems; failure analysis; hardware trojan; hash function; power analysis; prime field; pseudo-random numbers; algorithm analysis and problem complexity; Cryptology; Coding and Information Theory; Data Structures and Information Theory; Data and Information Security; Algorithms; Discrete Mathematics in Computer Science; Kryptografie, Verschlüsselungstechnologie; Informationstheorie; Algorithmen und Datenstrukturen; Computersicherheit; Netzwerksicherheit; Mathematik für Informatiker; Diskrete Mathematik; EA
Low Cost Cryptography.- Quark: A Lightweight Hash.- PRINTcipher: A Block Cipher for IC-Printing.- Sponge-Based Pseudo-Random Number Generators.- Efficient Implementations I.- A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over .- Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves.- Efficient Techniques for High-Speed Elliptic Curve Cryptography.- Side-Channel Attacks and Countermeasures I.- Analysis and Improvement of the Random Delay Countermeasure of CHES 2009.- New Results on Instruction Cache Attacks.- Correlation-Enhanced Power Analysis Collision Attack.- Side-Channel Analysis of Six SHA-3 Candidates.- Tamper Resistance and Hardware Trojans.- Flash Memory ‘Bumping’ Attacks.- Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection.- When Failure Analysis Meets Side-Channel Attacks.- Efficient Implementations II.- Fast Exhaustive Search for Polynomial Systems in .- 256 Bit Standardized Crypto for 650 GE – GOST Revisited.- Mixed Bases for Efficient Inversion in and Conversion Matrices of SubBytes of AES.- SHA-3.- Developing a Hardware Evaluation Method for SHA-3 Candidates.- Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs.- Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures.- XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework.- Fault Attacks and Countermeasures.- Public Key Perturbation of Randomized RSA Implementations.- Fault Sensitivity Analysis.- PUFs and RNGs.- An Alternative to Error Correction for SRAM-Like PUFs.- New High Entropy Element for FPGA Based True Random Number Generators.- The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes.-New Designs.- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.- ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware.- Side-Channel Attacks and Countermeasures II.- Provably Secure Higher-Order Masking of AES.- Algebraic Side-Channel Analysis in the Presence of Errors.- Coordinate Blinding over Large Prime Fields.Up to date results Fast conference proceedings State-of-the-art report
Outros livros adicionais, que poderiam ser muito similares com este livro:
Último livro semelhante:
9783642150319 Cryptographic Hardware and Embedded Systems -- CHES 2010 (Stefan Mangard; Francois-Xavier Standaert)
- 9783642150319 Cryptographic Hardware and Embedded Systems -- CHES 2010 (Stefan Mangard; Francois-Xavier Standaert)
- 9783540447092 Cryptographic Hardware and Embedded Systems - CHES 2001 (Cetin K. Koc; David Nacchae; Christof Paar)
- 9783540465614 Cryptographic Hardware and Embedded Systems - CHES 2006 (Louis Goubin; Mitsuru Matsui)
- 9783540425212 Cryptographic Hardware and Embedded Systems - CHES 2001 (Cetin K. Koc)
- 9783540465591 Cryptographic Hardware and Embedded Systems - CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings: 4249 (Lecture Notes in Computer Science, 4249) (Louis Goubin; Mitsuru Matsui)
< Para arquivar...