Normal view MARC view ISBD view

Cryptographic Hardware and Embedded Systems - CHES 2016 [electronic resource] : 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings / edited by Benedikt Gierlichs, Axel Y. Poschmann.

Contributor(s): Gierlichs, Benedikt [editor.] | Poschmann, Axel Y [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 9813Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2016Edition: 1st ed. 2016.Description: XIV, 650 p. 159 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783662531402.Subject(s): Computer networks  | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Computers | Data protection | Artificial intelligence | Computer Communication Networks | Cryptology | IT Operations | Computer Hardware | Data and Information Security | Artificial IntelligenceAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.6 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.

There are no comments for this item.

Log in to your account to post a comment.