|
|
|
|
LEADER |
02706nam a22003975i 4500 |
001 |
000291349 |
005 |
20210915191021.0 |
007 |
cr nn 008mamaa |
008 |
170306s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319546698
|
024 |
7 |
|
|a 10.1007/978-3-319-54669-8
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
245 |
1 |
0 |
|a Smart Card Research and Advanced Applications :
|b 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papers /
|c edited by Kerstin Lemke-Rust, Michael Tunstall.
|
250 |
|
|
|a 1st ed. 2017.
|
260 |
# |
# |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XII, 265 p. 93 illus. :
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Security and Cryptology ;
|v 10146
|
505 |
0 |
|
|a Kernel Discriminant Analysis for Information Extraction in the Presence of Masking -- Second Order Side-Channel Analysis on ISO9797-1 MAC Algorithm 3 -- Side-Channel Analysis of the TUAK Algorithm Used for Authentication and Key Agreement in 3G/4G Networks -- Reverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy -- Spectre: A Tiny Side-Channel Resistant Speck Core for FPGAs -- Concealing Secrets in Embedded Processors Designs -- The Hell Forgery, Self-Modifying Codes Shoot again -- Logical Attacks on Secured Containers of the Java Card Platform -- Single-Trace Side-Channel Attacks on Scalar Multiplications with Pre-Computations -- A Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves -- Inner Product Masking for Bit-slice Ciphers and Security Order Amplification for Linear Leakages -- Squeezing Polynomial Masking in Tower Fields -- PRNGs for Masking Applications and Their Mapping to Evolvable Hardware -- Automated Detection of Instruction Cache Leaks in Modular Exponentiation Software -- An Analysis of the Learning Parity with Noise Assumption against Fault Attacks.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Programming languages (Electronic computers).
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Programming Languages, Compilers, Interpreters.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
700 |
1 |
|
|a Lemke-Rust, Kerstin.
|e editor.
|
700 |
1 |
|
|a Tunstall, Michael.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|