Muutke küpsiste eelistusi

E-raamat: Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings

Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 8731
  • Ilmumisaeg: 12-Sep-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783662447093
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 8731
  • Ilmumisaeg: 12-Sep-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783662447093

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.
Side-Channel Attacks.- EM Attack Is Non-invasive? - Design Methodology
and Validity Verification of EM Attack Sensor.- A New Framework for
Constraint-Based Probabilistic Template Side Channel Attacks.- How to
Estimate the Success Rate of Higher-Order Side-Channel Attacks.- Good Is Not
Good Enough: Deriving Optimal Distinguishers from Communication Theory.- New
Attacks and Constructions.- Ooh Aah... Just a Little Bit : A Small Amount
of Side Channel Can Go a Long Way.- Destroying Fault Invariant with
Randomization: A Countermeasure for AES against Differential Fault Attacks.-
Reversing Stealthy Dopant-Level Circuits.- Constructing S-boxes for
Lightweight Cryptography with Feistel
Structure.- Countermeasures.- A Statistical Model for Higher Order DPA on
Masked Devices.- Fast Evaluation of Polynomials over Binary Finite Fields and
Application to Side-Channel Countermeasures.- Secure Conversion between
Boolean and Arithmetic Masking of Any Order.- Making RSAPSS Provably Secure
against Non-random Faults.- Algorithm Specific SCA.-
Side-Channel Attack against RSA Key Generation Algorithms.- Get Your Hands
Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.- RSA
Meets DPA: Recovering RSA Secret Keys from Noisy Analog
Data.- Simple Power Analysis on AES Key Expansion Revisited.- ECC
Implementations.- Efficient Pairings and ECC for Embedded Systems.-
Curve41417: Karatsuba Revisited.- Implementations.- Cofactorization on
Graphics Processing Units.- Enhanced Lattice-Based Signatures on
Reconfigurable Hardware.- Compact Ring-LWE Cryptoprocessor.- Hardware
Implementations of Symmetric Cryptosystems.- ICEPOLE: High-Speed,
Hardware-Oriented Authenticated Encryption.- FPGA Implementations of SPRING:
And Their Countermeasures against Side-Channel Attacks.- FOAM: Searching for
Hardware-Optimal SPN Structures and Components with a Fair Comparison.- PUFs
Secure Lightweight Entity Authentication with Strong PUFs: Mission
Impossible?.- Efficient Power and TimingSide Channels for Physical Unclonable
Functions.- Physical Characterization of Arbiter PUFs.- Bitline PUF: Building
Native Challenge-Response PUF Capability into Any SRAM.- RNGs and SCA Issues
in Hardware.- Embedded Evaluation of Randomness in Oscillator Based
Elementary
TRNG.- Entropy Evaluation for Oscillator-Based True Random Number
Generators.- Side-Channel Leakage through Static Power: Should We Care about
in Practice.- Gate-Level Masking under a Path-Based Leakage Metric.- Early
Propagation and Imbalanced Routing, How to Diminish in
FPGAs.