000 | 03983nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-319-43283-0 | ||
003 | DE-He213 | ||
005 | 20240730191833.0 | ||
007 | cr nn 008mamaa | ||
008 | 160725s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319432830 _9978-3-319-43283-0 |
||
024 | 7 |
_a10.1007/978-3-319-43283-0 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aConstructive Side-Channel Analysis and Secure Design _h[electronic resource] : _b7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers / _cedited by François-Xavier Standaert, Elisabeth Oswald. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aX, 219 p. 74 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9689 |
|
505 | 0 | _aSecurity and Physical Attacks -- Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption -- Co-location detection on the Cloud -- Simple Photonic Emission Attack with Reduced Data Complexity -- Side-Channel Analysis (case studies) -- Power Analysis Attacks against IEEE 802.15.4 Node -- Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series -- Dismantling real-world ECC with Horizontal and Vertical Template Attacks -- Fault Analysis -- Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT -- Improved Differential Fault Analysis on Camellia-128 -- A Note on the Security of CHES 2014 Symmetric Infective Countermeasure -- Side-Channel Analysis (tools) -- Simpler, Faster, and More Robust T-test Based Leakage Detection -- Design and implementation of a waveform-matching based triggering system -- Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. | |
520 | _aThis book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. The 12 papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named: security and physical attacks; side-channel analysis (case studies); fault analysis; and side-channel analysis (tools). | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9147504 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aDiscrete mathematics. _912873 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aDiscrete Mathematics in Computer Science. _931837 |
650 | 2 | 4 |
_aComputer Hardware. _933420 |
700 | 1 |
_aStandaert, François-Xavier. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9147505 |
|
700 | 1 |
_aOswald, Elisabeth. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9147506 |
|
710 | 2 |
_aSpringerLink (Online service) _9147507 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319432823 |
776 | 0 | 8 |
_iPrinted edition: _z9783319432847 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9689 _9147508 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-43283-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93929 _d93929 |