|
|
|
|
LEADER |
03382nam a2200613 4500 |
001 |
978-3-319-89641-0 |
003 |
DE-He213 |
005 |
20191022054359.0 |
007 |
cr nn 008mamaa |
008 |
180410s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319896410
|9 978-3-319-89641-0
|
024 |
7 |
|
|a 10.1007/978-3-319-89641-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Constructive Side-Channel Analysis and Secure Design
|h [electronic resource] :
|b 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings /
|c edited by Junfeng Fan, Benedikt Gierlichs.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a X, 263 p. 79 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 10815
|
505 |
0 |
|
|a Countermeasures against side-channel attacks -- Tools for side-channel analysis -- Fault attacks and hardware trojans -- Side-channel analysis attacks.
|
520 |
|
|
|a This book constitutes revised selected papers from the 9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, held in Singapore, in April 2018. The 14 papers presented in this volume were carefully reviewed and selected from 31 submissions. They were organized in topical sections named: countermeasures against side-channel attacks; tools for side-channel analysis; fault attacks and hardware trojans; and side-channel analysis attacks.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Architecture, Computer.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Microprogramming .
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Computer System Implementation.
|0 http://scigraph.springernature.com/things/product-market-codes/I13057
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I13030
|
650 |
2 |
4 |
|a Control Structures and Microprogramming.
|0 http://scigraph.springernature.com/things/product-market-codes/I12018
|
650 |
2 |
4 |
|a Coding and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15041
|
700 |
1 |
|
|a Fan, Junfeng.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Gierlichs, Benedikt.
|e editor.
|0 (orcid)0000-0002-5866-1990
|1 https://orcid.org/0000-0002-5866-1990
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319896403
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319896427
|
830 |
|
0 |
|a Security and Cryptology ;
|v 10815
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-89641-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|