Side Channel Attacks

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-ba...

Full description

Saved in:
Bibliographic Details
:
Year of Publication:2019
Language:English
Physical Description:1 electronic resource (258 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 03441nam-a2201033z--4500
001 993548020204498
005 20231214133602.0
006 m o d
007 cr|mn|---annan
008 202102s2019 xx |||||o ||| 0|eng d
020 |a 3-03921-001-7 
035 |a (CKB)4920000000094930 
035 |a (oapen)https://directory.doabooks.org/handle/20.500.12854/59342 
035 |a (EXLCZ)994920000000094930 
041 0 |a eng 
100 1 |a Hong, Seokhie  |4 auth 
245 1 0 |a Side Channel Attacks 
260 |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2019 
300 |a 1 electronic resource (258 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on. 
546 |a English 
653 |a binary Huff curve 
653 |a FPGA 
653 |a post quantum cryptography 
653 |a data loss 
653 |a side-channel cache attacks 
653 |a rsa cryptosystem 
653 |a first-order analysis 
653 |a chaotic circuit 
653 |a integrity 
653 |a ad libraries 
653 |a power-analysis attack 
653 |a single trace analysis 
653 |a side-channel authentication 
653 |a provable security 
653 |a ad lib 
653 |a cache misses 
653 |a cache side-channel attack 
653 |a leakage model 
653 |a NTRU 
653 |a graph 
653 |a AES 
653 |a hardware security 
653 |a recovery of secret exponent by triangular trace analysis 
653 |a side-channel attacks 
653 |a information leakage 
653 |a data outsourcing 
653 |a CPLD 
653 |a scatter-gather implementation 
653 |a modular exponentiation 
653 |a lattice-based cryptography 
653 |a elliptic curve cryptography 
653 |a Gaussian sampling 
653 |a post-quantum cryptography 
653 |a reliability 
653 |a unified point addition 
653 |a ad networks 
653 |a graph similarity 
653 |a mobile ads 
653 |a physically unclonable function 
653 |a tweakable block cipher 
653 |a Merkle (hash) tree 
653 |a machine-learning classification 
653 |a side channel attack 
653 |a online authentication 
653 |a side channel analysis 
653 |a financial IC card 
653 |a side-channel attack 
653 |a re-keying 
653 |a cloud computing 
653 |a cryptographic keys 
653 |a chaos theory 
653 |a horizontal collision correlation analysis 
653 |a countermeasure 
653 |a embedded system security 
653 |a cache attack 
653 |a single-trace attack 
653 |a software development kit (SDK) 
653 |a CDT sampling 
653 |a key bit-dependent attack 
653 |a side-channel analysis 
653 |a second-order analysis 
653 |a constant-time cryptographic algorithm 
653 |a android package (APK) 
653 |a challenge-response authentication 
776 |z 3-03921-000-9 
906 |a BOOK 
ADM |b 2023-12-15 05:58:30 Europe/Vienna  |f system  |c marc21  |a 2019-11-10 04:18:40 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338748580004498&Force_direct=true  |Z 5338748580004498  |b Available  |8 5338748580004498