Side Channel Attacks
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-ba...
Saved in:
: | |
---|---|
Year of Publication: | 2019 |
Language: | English |
Physical Description: | 1 electronic resource (258 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 03441nam-a2201033z--4500 | ||
---|---|---|---|
001 | 993548020204498 | ||
005 | 20231214133602.0 | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 202102s2019 xx |||||o ||| 0|eng d | ||
020 | |a 3-03921-001-7 | ||
035 | |a (CKB)4920000000094930 | ||
035 | |a (oapen)https://directory.doabooks.org/handle/20.500.12854/59342 | ||
035 | |a (EXLCZ)994920000000094930 | ||
041 | 0 | |a eng | |
100 | 1 | |a Hong, Seokhie |4 auth | |
245 | 1 | 0 | |a Side Channel Attacks |
260 | |b MDPI - Multidisciplinary Digital Publishing Institute |c 2019 | ||
300 | |a 1 electronic resource (258 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on. | ||
546 | |a English | ||
653 | |a binary Huff curve | ||
653 | |a FPGA | ||
653 | |a post quantum cryptography | ||
653 | |a data loss | ||
653 | |a side-channel cache attacks | ||
653 | |a rsa cryptosystem | ||
653 | |a first-order analysis | ||
653 | |a chaotic circuit | ||
653 | |a integrity | ||
653 | |a ad libraries | ||
653 | |a power-analysis attack | ||
653 | |a single trace analysis | ||
653 | |a side-channel authentication | ||
653 | |a provable security | ||
653 | |a ad lib | ||
653 | |a cache misses | ||
653 | |a cache side-channel attack | ||
653 | |a leakage model | ||
653 | |a NTRU | ||
653 | |a graph | ||
653 | |a AES | ||
653 | |a hardware security | ||
653 | |a recovery of secret exponent by triangular trace analysis | ||
653 | |a side-channel attacks | ||
653 | |a information leakage | ||
653 | |a data outsourcing | ||
653 | |a CPLD | ||
653 | |a scatter-gather implementation | ||
653 | |a modular exponentiation | ||
653 | |a lattice-based cryptography | ||
653 | |a elliptic curve cryptography | ||
653 | |a Gaussian sampling | ||
653 | |a post-quantum cryptography | ||
653 | |a reliability | ||
653 | |a unified point addition | ||
653 | |a ad networks | ||
653 | |a graph similarity | ||
653 | |a mobile ads | ||
653 | |a physically unclonable function | ||
653 | |a tweakable block cipher | ||
653 | |a Merkle (hash) tree | ||
653 | |a machine-learning classification | ||
653 | |a side channel attack | ||
653 | |a online authentication | ||
653 | |a side channel analysis | ||
653 | |a financial IC card | ||
653 | |a side-channel attack | ||
653 | |a re-keying | ||
653 | |a cloud computing | ||
653 | |a cryptographic keys | ||
653 | |a chaos theory | ||
653 | |a horizontal collision correlation analysis | ||
653 | |a countermeasure | ||
653 | |a embedded system security | ||
653 | |a cache attack | ||
653 | |a single-trace attack | ||
653 | |a software development kit (SDK) | ||
653 | |a CDT sampling | ||
653 | |a key bit-dependent attack | ||
653 | |a side-channel analysis | ||
653 | |a second-order analysis | ||
653 | |a constant-time cryptographic algorithm | ||
653 | |a android package (APK) | ||
653 | |a challenge-response authentication | ||
776 | |z 3-03921-000-9 | ||
906 | |a BOOK | ||
ADM | |b 2023-12-15 05:58:30 Europe/Vienna |f system |c marc21 |a 2019-11-10 04:18:40 Europe/Vienna |g false | ||
AVE | |i DOAB Directory of Open Access Books |P DOAB Directory of Open Access Books |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338748580004498&Force_direct=true |Z 5338748580004498 |b Available |8 5338748580004498 |