| 000 | 03707naaaa2201033uu 4500 | ||
|---|---|---|---|
| 001 | https://directory.doabooks.org/handle/20.500.12854/59342 | ||
| 005 | 20220219202028.0 | ||
| 020 | _abooks978-3-03921-001-5 | ||
| 020 | _a9783039210008 | ||
| 020 | _a9783039210015 | ||
| 024 | 7 |
_a10.3390/books978-3-03921-001-5 _cdoi |
|
| 041 | 0 | _aEnglish | |
| 042 | _adc | ||
| 100 | 1 |
_aHong, Seokhie _4auth |
|
| 245 | 1 | 0 | _aSide Channel Attacks |
| 260 |
_bMDPI - Multidisciplinary Digital Publishing Institute _c2019 |
||
| 300 | _a1 electronic resource (258 p.) | ||
| 506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
| 520 | _aThis Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on. | ||
| 540 |
_aCreative Commons _fhttps://creativecommons.org/licenses/by-nc-nd/4.0/ _2cc _4https://creativecommons.org/licenses/by-nc-nd/4.0/ |
||
| 546 | _aEnglish | ||
| 653 | _an/a | ||
| 653 | _abinary Huff curve | ||
| 653 | _aFPGA | ||
| 653 | _apost quantum cryptography | ||
| 653 | _adata loss | ||
| 653 | _aside-channel cache attacks | ||
| 653 | _arsa cryptosystem | ||
| 653 | _afirst-order analysis | ||
| 653 | _achaotic circuit | ||
| 653 | _aintegrity | ||
| 653 | _aad libraries | ||
| 653 | _apower-analysis attack | ||
| 653 | _asingle trace analysis | ||
| 653 | _aside-channel authentication | ||
| 653 | _aprovable security | ||
| 653 | _aad lib | ||
| 653 | _acache misses | ||
| 653 | _acache side-channel attack | ||
| 653 | _aleakage model | ||
| 653 | _aNTRU | ||
| 653 | _agraph | ||
| 653 | _aAES | ||
| 653 | _ahardware security | ||
| 653 | _arecovery of secret exponent by triangular trace analysis | ||
| 653 | _aside-channel attacks | ||
| 653 | _ainformation leakage | ||
| 653 | _adata outsourcing | ||
| 653 | _aCPLD | ||
| 653 | _ascatter-gather implementation | ||
| 653 | _amodular exponentiation | ||
| 653 | _alattice-based cryptography | ||
| 653 | _aelliptic curve cryptography | ||
| 653 | _aGaussian sampling | ||
| 653 | _apost-quantum cryptography | ||
| 653 | _areliability | ||
| 653 | _aunified point addition | ||
| 653 | _aad networks | ||
| 653 | _agraph similarity | ||
| 653 | _amobile ads | ||
| 653 | _aphysically unclonable function | ||
| 653 | _atweakable block cipher | ||
| 653 | _aMerkle (hash) tree | ||
| 653 | _amachine-learning classification | ||
| 653 | _aside channel attack | ||
| 653 | _aonline authentication | ||
| 653 | _aside channel analysis | ||
| 653 | _afinancial IC card | ||
| 653 | _aside-channel attack | ||
| 653 | _are-keying | ||
| 653 | _acloud computing | ||
| 653 | _acryptographic keys | ||
| 653 | _achaos theory | ||
| 653 | _ahorizontal collision correlation analysis | ||
| 653 | _acountermeasure | ||
| 653 | _aembedded system security | ||
| 653 | _acache attack | ||
| 653 | _asingle-trace attack | ||
| 653 | _asoftware development kit (SDK) | ||
| 653 | _aCDT sampling | ||
| 653 | _akey bit-dependent attack | ||
| 653 | _aside-channel analysis | ||
| 653 | _asecond-order analysis | ||
| 653 | _aconstant-time cryptographic algorithm | ||
| 653 | _aandroid package (APK) | ||
| 653 | _achallenge-response authentication | ||
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://mdpi.com/books/pdfview/book/1339 _70 _zDOAB: download the publication |
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://directory.doabooks.org/handle/20.500.12854/59342 _70 _zDOAB: description of the publication |
| 999 |
_c41385 _d41385 |
||