000 03707naaaa2201033uu 4500
001 https://directory.doabooks.org/handle/20.500.12854/59342
005 20220219202028.0
020 _abooks978-3-03921-001-5
020 _a9783039210008
020 _a9783039210015
024 7 _a10.3390/books978-3-03921-001-5
_cdoi
041 0 _aEnglish
042 _adc
100 1 _aHong, Seokhie
_4auth
245 1 0 _aSide Channel Attacks
260 _bMDPI - Multidisciplinary Digital Publishing Institute
_c2019
300 _a1 electronic resource (258 p.)
506 0 _aOpen Access
_2star
_fUnrestricted online access
520 _aThis Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.
540 _aCreative Commons
_fhttps://creativecommons.org/licenses/by-nc-nd/4.0/
_2cc
_4https://creativecommons.org/licenses/by-nc-nd/4.0/
546 _aEnglish
653 _an/a
653 _abinary Huff curve
653 _aFPGA
653 _apost quantum cryptography
653 _adata loss
653 _aside-channel cache attacks
653 _arsa cryptosystem
653 _afirst-order analysis
653 _achaotic circuit
653 _aintegrity
653 _aad libraries
653 _apower-analysis attack
653 _asingle trace analysis
653 _aside-channel authentication
653 _aprovable security
653 _aad lib
653 _acache misses
653 _acache side-channel attack
653 _aleakage model
653 _aNTRU
653 _agraph
653 _aAES
653 _ahardware security
653 _arecovery of secret exponent by triangular trace analysis
653 _aside-channel attacks
653 _ainformation leakage
653 _adata outsourcing
653 _aCPLD
653 _ascatter-gather implementation
653 _amodular exponentiation
653 _alattice-based cryptography
653 _aelliptic curve cryptography
653 _aGaussian sampling
653 _apost-quantum cryptography
653 _areliability
653 _aunified point addition
653 _aad networks
653 _agraph similarity
653 _amobile ads
653 _aphysically unclonable function
653 _atweakable block cipher
653 _aMerkle (hash) tree
653 _amachine-learning classification
653 _aside channel attack
653 _aonline authentication
653 _aside channel analysis
653 _afinancial IC card
653 _aside-channel attack
653 _are-keying
653 _acloud computing
653 _acryptographic keys
653 _achaos theory
653 _ahorizontal collision correlation analysis
653 _acountermeasure
653 _aembedded system security
653 _acache attack
653 _asingle-trace attack
653 _asoftware development kit (SDK)
653 _aCDT sampling
653 _akey bit-dependent attack
653 _aside-channel analysis
653 _asecond-order analysis
653 _aconstant-time cryptographic algorithm
653 _aandroid package (APK)
653 _achallenge-response authentication
856 4 0 _awww.oapen.org
_uhttps://mdpi.com/books/pdfview/book/1339
_70
_zDOAB: download the publication
856 4 0 _awww.oapen.org
_uhttps://directory.doabooks.org/handle/20.500.12854/59342
_70
_zDOAB: description of the publication
999 _c41385
_d41385