L'édition de cet ISBN n'est malheureusement plus disponible.
Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection.- Dynamic Fault Injection Countermeasure: A New Conception of Java Card Security.- Java Card Combined Attacks with Localization-Agnostic Fault.- Improved (and Practical) Public-Key Authentication for UHF RFID. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards.- On the Use of Shamir's Secret Sharing against Side-Channel Analysis.- Secure Multiple SBoxes Implementation with Arithmetically Masked Input.- Low-Cost Countermeasure against RPA.- Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models.- On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices.- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.- Putting together What Fits together - GrÆStl.- Memory Access Pattern Protection for Resource-Constrained Devices.- Multipurpose Cryptographic Primitive ARMADILLO3.- Improving Side-Channel Analysis with Optimal Linear Transforms.- SCA with Magnitude Squared Coherence.- Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis.- Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines.- Defensive Leakage Camouflage.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
(Aucun exemplaire disponible)
Chercher: Créez une demandeVous ne trouvez pas le livre que vous recherchez ? Nous allons poursuivre vos recherches. Si l'un de nos libraires l'ajoute aux offres sur AbeBooks, nous vous le ferons savoir !
Créez une demande