Cantitate/Preț
Produs

Smart Card Research and Advanced Applications: 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papers: Lecture Notes in Computer Science, cartea 10728

Editat de Thomas Eisenbarth, Yannick Teglia
en Limba Engleză Paperback – 26 ian 2018
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, held in Lugano, Switzerland, in November 2017. The 14 revised full papers presented together with 2 abstracts of invited talks in this book were carefully reviewed and selected from 48 submissions. 
CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 38661 lei

Nou

Puncte Express: 580

Preț estimativ în valută:
7398 7734$ 6252£

Carte tipărită la comandă

Livrare economică 07-21 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319752075
ISBN-10: 3319752073
Pagini: 247
Ilustrații: XVI, 249 p. 80 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.38 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.- Optimal First-Order Boolean Masking for Embedded IoT Devices.- A first-order chosen plaintext DPA attack on the third round of DES.- A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks.- A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.- Leakage Bounds for Gaussian Side Channels.- Towards Sound and Optimal Leakage Detection Procedure.- Connecting and Improving Direct Sum Masking and Inner Product Masking.- May The Force Be With You: Force-Based Relay Attack Detection.- Instruction Duplication: Leaky and Not Too Fault-Tolerant!.- An EM Fault Injection Susceptibility Criterion and its application to the localization of hotspots.- Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers.- Horizontal clustering side-channel attacks on embedded ECC implementations.- Trace Augmentation: What Can Be Done Even Before Preprocessing in a Pro led SCA?