2010, ISBN: 3642150306
[EAN: 9783642150302], Neubuch, [PU: Springer Berlin Heidelberg], DATENVERARBEITUNG DATENVERSCHLÜSSELUNG, KRYPTOGRAFIE VERSCHLÜSSELUNG INFORMATIONSTHEORIE KRYPTOLOGIE DISKRET (MATHEMATISCH… Más…
AbeBooks.de moluna, Greven, Germany [73551232] [Rating: 4 (von 5)] NEW BOOK. Gastos de envío:Versandkostenfrei. (EUR 0.00) Details... |
2010, ISBN: 9783642150302
Editor: Mangard, Stefan, Editor: Standaert, Francois-Xavier, Springer, Paperback, Auflage: 2010, 471 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: 3088167… Más…
amazon.co.uk Gastos de envío:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 5.57) Details... |
2010, ISBN: 9783642150302
Pasta blanda
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Up to date resultsFast co… Más…
booklooker.de |
2010, ISBN: 3642150306
[EAN: 9783642150302], Nouveau livre, [SC: 4.37], [PU: Springer Berlin Heidelberg 2010-07-30, Berlin], Language: ENG, Books
ZVAB.com Blackwell's, Oxford, OX, United Kingdom [8052444] [Note: 5 (sur 5)] NEW BOOK. Gastos de envío: EUR 4.37 Details... |
2010, ISBN: 9783642150302
Pasta blanda
12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2010
lehmanns.de Gastos de envío:Versand in 10-14 Tagen. (EUR 9.95) Details... |
2010, ISBN: 3642150306
[EAN: 9783642150302], Neubuch, [PU: Springer Berlin Heidelberg], DATENVERARBEITUNG DATENVERSCHLÜSSELUNG, KRYPTOGRAFIE VERSCHLÜSSELUNG INFORMATIONSTHEORIE KRYPTOLOGIE DISKRET (MATHEMATISCH… Más…
2010, ISBN: 9783642150302
Editor: Mangard, Stefan, Editor: Standaert, Francois-Xavier, Springer, Paperback, Auflage: 2010, 471 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: 3088167… Más…
2010
ISBN: 9783642150302
Pasta blanda
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Up to date resultsFast co… Más…
2010, ISBN: 3642150306
[EAN: 9783642150302], Nouveau livre, [SC: 4.37], [PU: Springer Berlin Heidelberg 2010-07-30, Berlin], Language: ENG, Books
2010, ISBN: 9783642150302
Pasta blanda
12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2010
Datos bibliográficos del mejor libro coincidente
Autor: | |
Título: | |
ISBN: |
Detalles del libro - Cryptographic Hardware and Embedded Systems -- CHES 2010
EAN (ISBN-13): 9783642150302
ISBN (ISBN-10): 3642150306
Tapa dura
Tapa blanda
Año de publicación: 2010
Editorial: Springer Berlin
458 Páginas
Peso: 0,708 kg
Idioma: eng/Englisch
Libro en la base de datos desde 2009-07-21T07:45:57+02:00 (Madrid)
Página de detalles modificada por última vez el 2023-08-29T09:38:50+02:00 (Madrid)
ISBN/EAN: 3642150306
ISBN - escritura alterna:
3-642-15030-6, 978-3-642-15030-2
Mode alterno de escritura y términos de búsqueda relacionados:
Autor del libro: von francois, standaert, mang, twain mark, martin zoller, jean philippe, alexandre dumas, frank martin, august philippe, frank markus, martin zöller, kuhn august, august kühn, markus held, barbara frank, frank ivan
Título del libro: crypto 2010, hardware, embedded systems, barbara, ein yankee aus conneticut, santa workshop, proceedings international workshop
Datos del la editorial
Autor: Stefan Mangard; Francois-Xavier Standaert
Título: Lecture Notes in Computer Science; Security and Cryptology; Cryptographic Hardware and Embedded Systems -- CHES 2010 - 12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings
Editorial: Springer; Springer Berlin
458 Páginas
Año de publicación: 2010-07-30
Berlin; Heidelberg; DE
Idioma: Inglés
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 458 p. 142 illus.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; FPGA; algebraic attacks; calculus; collision attack; cryptanalyis; cryptography; elliptic curves; embedded systems; failure analysis; hardware trojan; hash function; power analysis; prime field; pseudo-random numbers; algorithm analysis and problem complexity; Cryptology; Coding and Information Theory; Data Structures and Information Theory; Data and Information Security; Algorithms; Discrete Mathematics in Computer Science; Kryptografie, Verschlüsselungstechnologie; Informationstheorie; Algorithmen und Datenstrukturen; Computersicherheit; Netzwerksicherheit; Mathematik für Informatiker; Diskrete Mathematik; EA
Low Cost Cryptography.- Quark: A Lightweight Hash.- PRINTcipher: A Block Cipher for IC-Printing.- Sponge-Based Pseudo-Random Number Generators.- Efficient Implementations I.- A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over .- Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves.- Efficient Techniques for High-Speed Elliptic Curve Cryptography.- Side-Channel Attacks and Countermeasures I.- Analysis and Improvement of the Random Delay Countermeasure of CHES 2009.- New Results on Instruction Cache Attacks.- Correlation-Enhanced Power Analysis Collision Attack.- Side-Channel Analysis of Six SHA-3 Candidates.- Tamper Resistance and Hardware Trojans.- Flash Memory ‘Bumping’ Attacks.- Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection.- When Failure Analysis Meets Side-Channel Attacks.- Efficient Implementations II.- Fast Exhaustive Search for Polynomial Systems in .- 256 Bit Standardized Crypto for 650 GE – GOST Revisited.- Mixed Bases for Efficient Inversion in and Conversion Matrices of SubBytes of AES.- SHA-3.- Developing a Hardware Evaluation Method for SHA-3 Candidates.- Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs.- Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures.- XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework.- Fault Attacks and Countermeasures.- Public Key Perturbation of Randomized RSA Implementations.- Fault Sensitivity Analysis.- PUFs and RNGs.- An Alternative to Error Correction for SRAM-Like PUFs.- New High Entropy Element for FPGA Based True Random Number Generators.- The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes.-New Designs.- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.- ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware.- Side-Channel Attacks and Countermeasures II.- Provably Secure Higher-Order Masking of AES.- Algebraic Side-Channel Analysis in the Presence of Errors.- Coordinate Blinding over Large Prime Fields.Up to date results Fast conference proceedings State-of-the-art report
Más, otros libros, que pueden ser muy parecidos a este:
Último libro similar:
9783642150319 Cryptographic Hardware and Embedded Systems -- CHES 2010 (Stefan Mangard; Francois-Xavier Standaert)
- 9783642150319 Cryptographic Hardware and Embedded Systems -- CHES 2010 (Stefan Mangard; Francois-Xavier Standaert)
- 9783540447092 Cryptographic Hardware and Embedded Systems - CHES 2001 (Cetin K. Koc; David Nacchae; Christof Paar)
- 9783540465614 Cryptographic Hardware and Embedded Systems - CHES 2006 (Louis Goubin; Mitsuru Matsui)
- 9783540425212 Cryptographic Hardware and Embedded Systems - CHES 2001 (Cetin K. Koc)
- 9783540465591 Cryptographic Hardware and Embedded Systems - CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings: 4249 (Lecture Notes in Computer Science, 4249) (Louis Goubin; Mitsuru Matsui)
< para archivar...