Smart Card Research and Advanced Applications
Pierre-Yvan Liardet
Resumo
Ver tudo
Smart Card Research and Advanced Applications
Post-Quantum Cryptography.- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime.- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers.- Classic McEliece Implementation with Low Memory Footprint.- Efficient Implementations.- A Fast and Compact RISC-V Accelerator for Ascon and Friends.- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE.- Secure and E cient Delegation of Pairings with Online Inputs.- Physical...
Post-Quantum Cryptography.- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime.- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers.- Classic McEliece Implementation with Low Memory Footprint.- Efficient Implementations.- A Fast and Compact RISC-V Accelerator for Ascon and Friends.- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE.- Secure and E cient Delegation of Pairings with Online Inputs.- Physical...
Smart Card Research and Advanced Applications
Resumo
Smart Card Research and Advanced Applications
Post-Quantum Cryptography.- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime.- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers.- Classic McEliece Implementation with Low Memory Footprint.- Efficient Implementations.- A Fast and Compact RISC-V Accelerator for Ascon and Friends.- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE.- Secure and E cient Delegation of Pairings with Online Inputs.- Physical Attacks.- On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough.- A Power Side-Channel Attack on the CCA2-Secure HQC KEM.- How Deep Learning Helps Compromising USIM.- Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.- Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices.- Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
Nº de Páginas:
Encadernação: Capa Mole / Paperback
Tema: Coding theory & cryptology
Post-Quantum Cryptography.- A Constant Time Full Hardware Implementation of Streamlined NTRU Prime.- Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers.- Classic McEliece Implementation with Low Memory Footprint.- Efficient Implementations.- A Fast and Compact RISC-V Accelerator for Ascon and Friends.- Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE.- Secure and E cient Delegation of Pairings with Online Inputs.- Physical Attacks.- On the Security of O -the-Shelf Microcontrollers: Hardware is not Enough.- A Power Side-Channel Attack on the CCA2-Secure HQC KEM.- How Deep Learning Helps Compromising USIM.- Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.- Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices.- Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
Nº de Páginas:
Encadernação: Capa Mole / Paperback
Tema: Coding theory & cryptology
Publicidade
Avaliações dos nossos clientes
Smart Card Research and Advanced Applications
Sê o primeiro a dar
a tua opinião sobre este produto
Características
- Editora
-
Springer
- Idiomas
-
Inglês
- Peso
-
327,0
- Data de lançamento
-
29/01/2021
- Série/Edição Limitada
-
1st ed. 2021
- EAN
-
9783030684860
Publicidade
Publicidade