Side Channel Attacks

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-ba...

Full description

Saved in:
Bibliographic Details
:
Year of Publication:2019
Language:English
Physical Description:1 electronic resource (258 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993548020204498
ctrlnum (CKB)4920000000094930
(oapen)https://directory.doabooks.org/handle/20.500.12854/59342
(EXLCZ)994920000000094930
collection bib_alma
record_format marc
spelling Hong, Seokhie auth
Side Channel Attacks
MDPI - Multidisciplinary Digital Publishing Institute 2019
1 electronic resource (258 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.
English
binary Huff curve
FPGA
post quantum cryptography
data loss
side-channel cache attacks
rsa cryptosystem
first-order analysis
chaotic circuit
integrity
ad libraries
power-analysis attack
single trace analysis
side-channel authentication
provable security
ad lib
cache misses
cache side-channel attack
leakage model
NTRU
graph
AES
hardware security
recovery of secret exponent by triangular trace analysis
side-channel attacks
information leakage
data outsourcing
CPLD
scatter-gather implementation
modular exponentiation
lattice-based cryptography
elliptic curve cryptography
Gaussian sampling
post-quantum cryptography
reliability
unified point addition
ad networks
graph similarity
mobile ads
physically unclonable function
tweakable block cipher
Merkle (hash) tree
machine-learning classification
side channel attack
online authentication
side channel analysis
financial IC card
side-channel attack
re-keying
cloud computing
cryptographic keys
chaos theory
horizontal collision correlation analysis
countermeasure
embedded system security
cache attack
single-trace attack
software development kit (SDK)
CDT sampling
key bit-dependent attack
side-channel analysis
second-order analysis
constant-time cryptographic algorithm
android package (APK)
challenge-response authentication
3-03921-000-9
language English
format eBook
author Hong, Seokhie
spellingShingle Hong, Seokhie
Side Channel Attacks
author_facet Hong, Seokhie
author_variant s h sh
author_sort Hong, Seokhie
title Side Channel Attacks
title_full Side Channel Attacks
title_fullStr Side Channel Attacks
title_full_unstemmed Side Channel Attacks
title_auth Side Channel Attacks
title_new Side Channel Attacks
title_sort side channel attacks
publisher MDPI - Multidisciplinary Digital Publishing Institute
publishDate 2019
physical 1 electronic resource (258 p.)
isbn 3-03921-001-7
3-03921-000-9
illustrated Not Illustrated
work_keys_str_mv AT hongseokhie sidechannelattacks
status_str n
ids_txt_mv (CKB)4920000000094930
(oapen)https://directory.doabooks.org/handle/20.500.12854/59342
(EXLCZ)994920000000094930
carrierType_str_mv cr
is_hierarchy_title Side Channel Attacks
_version_ 1787551667547275264
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03441nam-a2201033z--4500</leader><controlfield tag="001">993548020204498</controlfield><controlfield tag="005">20231214133602.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202102s2019 xx |||||o ||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-03921-001-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000000094930</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/59342</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000000094930</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hong, Seokhie</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Side Channel Attacks</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (258 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">binary Huff curve</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">FPGA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">post quantum cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data loss</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side-channel cache attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">rsa cryptosystem</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">first-order analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">chaotic circuit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">integrity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ad libraries</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">power-analysis attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">single trace analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side-channel authentication</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">provable security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ad lib</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cache misses</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cache side-channel attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">leakage model</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NTRU</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">graph</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">AES</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hardware security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">recovery of secret exponent by triangular trace analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side-channel attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">information leakage</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data outsourcing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">CPLD</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">scatter-gather implementation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">modular exponentiation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">lattice-based cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">elliptic curve cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Gaussian sampling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">post-quantum cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">reliability</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">unified point addition</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ad networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">graph similarity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">mobile ads</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">physically unclonable function</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">tweakable block cipher</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Merkle (hash) tree</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">machine-learning classification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side channel attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">online authentication</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side channel analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">financial IC card</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side-channel attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">re-keying</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cloud computing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cryptographic keys</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">chaos theory</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">horizontal collision correlation analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">countermeasure</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">embedded system security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cache attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">single-trace attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">software development kit (SDK)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">CDT sampling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">key bit-dependent attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">side-channel analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">second-order analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">constant-time cryptographic algorithm</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">android package (APK)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">challenge-response authentication</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-03921-000-9</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:58:30 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-11-10 04:18:40 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338748580004498&amp;Force_direct=true</subfield><subfield code="Z">5338748580004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338748580004498</subfield></datafield></record></collection>