Side Channel Attacks (Record no. 41385)

MARC details
000 -LEADER
fixed length control field 03707naaaa2201033uu 4500
001 - CONTROL NUMBER
control field https://directory.doabooks.org/handle/20.500.12854/59342
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220219202028.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number books978-3-03921-001-5
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783039210008
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783039210015
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.3390/books978-3-03921-001-5
Terms of availability doi
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title English
042 ## - AUTHENTICATION CODE
Authentication code dc
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hong, Seokhie
Relationship auth
245 10 - TITLE STATEMENT
Title Side Channel Attacks
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. MDPI - Multidisciplinary Digital Publishing Institute
Date of publication, distribution, etc. 2019
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic resource (258 p.)
506 0# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Open Access
Source of term star
Standardized terminology for access restriction Unrestricted online access
520 ## - SUMMARY, ETC.
Summary, etc. This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction Creative Commons
Use and reproduction rights https://creativecommons.org/licenses/by-nc-nd/4.0/
Source of term cc
-- https://creativecommons.org/licenses/by-nc-nd/4.0/
546 ## - LANGUAGE NOTE
Language note English
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term n/a
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term binary Huff curve
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term FPGA
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term post quantum cryptography
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term data loss
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term side-channel cache attacks
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term rsa cryptosystem
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term first-order analysis
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term chaotic circuit
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term integrity
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term ad libraries
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term power-analysis attack
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term single trace analysis
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term side-channel authentication
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term provable security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term ad lib
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cache misses
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cache side-channel attack
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term leakage model
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term NTRU
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term graph
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term AES
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term hardware security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term recovery of secret exponent by triangular trace analysis
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term side-channel attacks
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term information leakage
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term data outsourcing
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term CPLD
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term scatter-gather implementation
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term modular exponentiation
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term lattice-based cryptography
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term elliptic curve cryptography
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Gaussian sampling
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term post-quantum cryptography
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term reliability
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term unified point addition
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term ad networks
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term graph similarity
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term mobile ads
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term physically unclonable function
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term tweakable block cipher
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Merkle (hash) tree
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term machine-learning classification
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term side channel attack
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term online authentication
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term side channel analysis
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term financial IC card
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term side-channel attack
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term re-keying
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cloud computing
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cryptographic keys
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term chaos theory
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term horizontal collision correlation analysis
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term countermeasure
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term embedded system security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cache attack
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term single-trace attack
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term software development kit (SDK)
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term CDT sampling
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term key bit-dependent attack
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term side-channel analysis
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term second-order analysis
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term constant-time cryptographic algorithm
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term android package (APK)
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term challenge-response authentication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://mdpi.com/books/pdfview/book/1339">https://mdpi.com/books/pdfview/book/1339</a>
Access status 0
Public note DOAB: download the publication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://directory.doabooks.org/handle/20.500.12854/59342">https://directory.doabooks.org/handle/20.500.12854/59342</a>
Access status 0
Public note DOAB: description of the publication

No items available.