|
|
|
|
LEADER |
03415nam a2200589 4500 |
001 |
978-3-030-16350-1 |
003 |
DE-He213 |
005 |
20191022061544.0 |
007 |
cr nn 008mamaa |
008 |
190315s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030163501
|9 978-3-030-16350-1
|
024 |
7 |
|
|a 10.1007/978-3-030-16350-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Constructive Side-Channel Analysis and Secure Design
|h [electronic resource] :
|b 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings /
|c edited by Ilia Polian, Marc Stöttinger.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a X, 303 p. 230 illus., 64 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11421
|
505 |
0 |
|
|a Side-Channel Attacks -- Fault-Injection Attacks -- White-Box Attacks -- Side-Channel Analysis Methodologies -- Security Aspects of Post-Quantum Schemes -- Countermeasures Against Implementation Attacks.
|
520 |
|
|
|a This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019. The 14 papers presented together with one keynote and one invited talk in this volume were carefully reviewed and selected from 34 submissions. They were organized in topical sections named: Side-Channel Attacks; Fault-Injection Attacks; White-Box Attacks; Side-Channel Analysis Methodologies; Security Aspects of Post-Quantum Schemes; and Countermeasures Against Implementation Attacks.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Microprogramming .
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13006
|
650 |
2 |
4 |
|a Control Structures and Microprogramming.
|0 http://scigraph.springernature.com/things/product-market-codes/I12018
|
650 |
2 |
4 |
|a Coding and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15041
|
650 |
2 |
4 |
|a Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14045
|
700 |
1 |
|
|a Polian, Ilia.
|e editor.
|0 (orcid)0000-0002-6563-2725
|1 https://orcid.org/0000-0002-6563-2725
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Stöttinger, Marc.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030163495
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030163518
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11421
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-16350-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|