Cantitate/Preț
Produs

Smart Card Research and Advanced Applications: 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers: Lecture Notes in Computer Science, cartea 11833

Editat de Sonia Belaïd, Tim Güneysu
en Limba Engleză Paperback – 19 feb 2020
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Smart Card Research and Advanced Applications, CARDIS 2019, held in Prague, Czech Republic, in November 2019.
The 15 revised full papers presented in this book were carefully reviewed and selected from 31 submissions. The papers are organized in the following topical sections: system-on-a-chip security; post-quantum cryptography; side-channel analysis; microarchitectural attacks; cryptographic primitives; advances in side-channel analysis.
CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 38720 lei

Nou

Puncte Express: 581

Preț estimativ în valută:
7410 7645$ 6271£

Carte tipărită la comandă

Livrare economică 05-19 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030420673
ISBN-10: 3030420671
Pagini: 200
Ilustrații: X, 269 p. 106 illus., 50 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.4 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

System-on-a-Chip Security.- In-situ Extraction of Randomness from Computer Architecture through Hardware Performance Counters.- Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Latency and Low-Energy Applications.- Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance.- Post-Quantum Cryptography.- Improving Speed of Dilithium's Signing Procedure.- An efficient and provable masked implementation of qtesla.- Side-Channel Analysis.- Side-channel attacks on blinded scalar multiplications revisited.- Remote Side-Channel Attacks on Heterogeneous SoC.- Optimal Collision Side-Channel Attacks.- Microarchitectural Attacks.- A Bit-Level Approach to Side Channel Based Disassembling.- CCCiCC: A Cross-core Cache-independent Covert Channel on AMD Family 15h CPUs.- Design Considerations for EM Pulse Fault Injection.- Cryptographic Primitives.- Lightweight MACs from Universal Hash Functions.- FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms.- Advances in Side-Channel Analysis.- A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis.- Key Enumeration from the Adversarial Viewpoint. When to Stop Measuring and Start Enumerating?.