Side Channel Attacks
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-ba...
Saved in:
: | |
---|---|
Year of Publication: | 2019 |
Language: | English |
Physical Description: | 1 electronic resource (258 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993548020204498 |
---|---|
ctrlnum |
(CKB)4920000000094930 (oapen)https://directory.doabooks.org/handle/20.500.12854/59342 (EXLCZ)994920000000094930 |
collection |
bib_alma |
record_format |
marc |
spelling |
Hong, Seokhie auth Side Channel Attacks MDPI - Multidisciplinary Digital Publishing Institute 2019 1 electronic resource (258 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on. English binary Huff curve FPGA post quantum cryptography data loss side-channel cache attacks rsa cryptosystem first-order analysis chaotic circuit integrity ad libraries power-analysis attack single trace analysis side-channel authentication provable security ad lib cache misses cache side-channel attack leakage model NTRU graph AES hardware security recovery of secret exponent by triangular trace analysis side-channel attacks information leakage data outsourcing CPLD scatter-gather implementation modular exponentiation lattice-based cryptography elliptic curve cryptography Gaussian sampling post-quantum cryptography reliability unified point addition ad networks graph similarity mobile ads physically unclonable function tweakable block cipher Merkle (hash) tree machine-learning classification side channel attack online authentication side channel analysis financial IC card side-channel attack re-keying cloud computing cryptographic keys chaos theory horizontal collision correlation analysis countermeasure embedded system security cache attack single-trace attack software development kit (SDK) CDT sampling key bit-dependent attack side-channel analysis second-order analysis constant-time cryptographic algorithm android package (APK) challenge-response authentication 3-03921-000-9 |
language |
English |
format |
eBook |
author |
Hong, Seokhie |
spellingShingle |
Hong, Seokhie Side Channel Attacks |
author_facet |
Hong, Seokhie |
author_variant |
s h sh |
author_sort |
Hong, Seokhie |
title |
Side Channel Attacks |
title_full |
Side Channel Attacks |
title_fullStr |
Side Channel Attacks |
title_full_unstemmed |
Side Channel Attacks |
title_auth |
Side Channel Attacks |
title_new |
Side Channel Attacks |
title_sort |
side channel attacks |
publisher |
MDPI - Multidisciplinary Digital Publishing Institute |
publishDate |
2019 |
physical |
1 electronic resource (258 p.) |
isbn |
3-03921-001-7 3-03921-000-9 |
illustrated |
Not Illustrated |
work_keys_str_mv |
AT hongseokhie sidechannelattacks |
status_str |
n |
ids_txt_mv |
(CKB)4920000000094930 (oapen)https://directory.doabooks.org/handle/20.500.12854/59342 (EXLCZ)994920000000094930 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Side Channel Attacks |
_version_ |
1787551667547275264 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03441nam-a2201033z--4500</leader><controlfield tag="001">993548020204498</controlfield><controlfield tag="005">20231214133602.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202102s2019 xx |||||o ||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-03921-001-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000000094930</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/59342</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000000094930</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hong, Seokhie</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Side Channel Attacks</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (258 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">binary Huff curve</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">FPGA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">post quantum cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data loss</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side-channel cache attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">rsa cryptosystem</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">first-order analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">chaotic circuit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">integrity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ad libraries</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">power-analysis attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">single trace analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side-channel authentication</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">provable security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ad lib</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cache misses</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cache side-channel attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">leakage model</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NTRU</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">graph</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">AES</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hardware security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">recovery of secret exponent by triangular trace analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side-channel attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">information leakage</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data outsourcing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">CPLD</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">scatter-gather implementation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">modular exponentiation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">lattice-based cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">elliptic curve cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Gaussian sampling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">post-quantum cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">reliability</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">unified point addition</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ad networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">graph similarity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">mobile ads</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">physically unclonable function</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">tweakable block cipher</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Merkle (hash) tree</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">machine-learning classification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side channel attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">online authentication</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side channel analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">financial IC card</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side-channel attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">re-keying</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cloud computing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cryptographic keys</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">chaos theory</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">horizontal collision correlation analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">countermeasure</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">embedded system security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cache attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">single-trace attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">software development kit (SDK)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">CDT sampling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">key bit-dependent attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side-channel analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">second-order analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">constant-time cryptographic algorithm</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">android package (APK)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">challenge-response authentication</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-03921-000-9</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:58:30 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-11-10 04:18:40 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338748580004498&Force_direct=true</subfield><subfield code="Z">5338748580004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338748580004498</subfield></datafield></record></collection> |