|
|
|
|
LEADER |
02993nam a22004095i 4500 |
001 |
000280448 |
005 |
20210628100033.0 |
007 |
cr nn 008mamaa |
008 |
170728s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319646473
|
024 |
7 |
|
|a 10.1007/978-3-319-64647-3
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
245 |
1 |
0 |
|a Constructive Side-Channel Analysis and Secure Design :
|b 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers /
|c edited by Sylvain Guilley.
|
250 |
|
|
|a 1st ed. 2017.
|
260 |
# |
# |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a X, 299 p. 127 illus. :
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Security and Cryptology ;
|v 10348
|
505 |
0 |
|
|a Does Coupling Affect the Security of Masked Implementations -- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA -- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors -- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA -- On the Construction of Side-Channel Attack Resilient S-boxes -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices -- Side-Channel Analysis of Keymill -- On the Easiness of Turning Higher-Order Leakages into First-Order -- Side-Channel Attacks against the Human Brain: The PIN Code Case Study -- Impacts of Technology Trends on Physical Attacks -- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go -- DFA on LS-Designs with a Practical Implementation on SCREAM -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors -- Getting the Most out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand -- Mind the Gap: Towards Secure 1st-Order Masking in Software.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Architecture, Computer.
|
650 |
|
0 |
|a Computer science—Mathematics.
|
650 |
|
0 |
|a Microprogramming .
|
650 |
1 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Computer System Implementation.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
650 |
2 |
4 |
|a Control Structures and Microprogramming.
|
700 |
1 |
|
|a Guilley, Sylvain.
|e editor.
|0 (orcid)0000-0002-5044-3534
|1 https://orcid.org/0000-0002-5044-3534
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|