Smart Card Research and Advanced Applications : 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papers /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Lemke-Rust, Kerstin. (Editor ), Tunstall, Michael. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Colección:Security and Cryptology ; 10146
Materias:
LEADER 02706nam a22003975i 4500
001 000291349
005 20210915191021.0
007 cr nn 008mamaa
008 170306s2017 gw | s |||| 0|eng d
020 |a 9783319546698 
024 7 |a 10.1007/978-3-319-54669-8  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Smart Card Research and Advanced Applications :  |b 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papers /  |c edited by Kerstin Lemke-Rust, Michael Tunstall. 
250 |a 1st ed. 2017. 
260 # # |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a XII, 265 p. 93 illus. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Security and Cryptology ;  |v 10146 
505 0 |a Kernel Discriminant Analysis for Information Extraction in the Presence of Masking -- Second Order Side-Channel Analysis on ISO9797-1 MAC Algorithm 3 -- Side-Channel Analysis of the TUAK Algorithm Used for Authentication and Key Agreement in 3G/4G Networks -- Reverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy -- Spectre: A Tiny Side-Channel Resistant Speck Core for FPGAs -- Concealing Secrets in Embedded Processors Designs -- The Hell Forgery, Self-Modifying Codes Shoot again -- Logical Attacks on Secured Containers of the Java Card Platform -- Single-Trace Side-Channel Attacks on Scalar Multiplications with Pre-Computations -- A Compact and Exception-Free Ladder for All Short Weierstrass Elliptic Curves -- Inner Product Masking for Bit-slice Ciphers and Security Order Amplification for Linear Leakages -- Squeezing Polynomial Masking in Tower Fields -- PRNGs for Masking Applications and Their Mapping to Evolvable Hardware -- Automated Detection of Instruction Cache Leaks in Modular Exponentiation Software -- An Analysis of the Learning Parity with Noise Assumption against Fault Attacks. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer security. 
650 0 |a Programming languages (Electronic computers). 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Algorithms. 
650 1 4 |a Cryptology. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Programming Languages, Compilers, Interpreters. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
700 1 |a Lemke-Rust, Kerstin.  |e editor. 
700 1 |a Tunstall, Michael.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks