Cryptographic Hardware and Embedded Systems -- CHES 2012 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings / [electronic resource] :
edited by Emmanuel Prouff, Patrick R. Schaumont.
- 1st ed. 2012.
- XVII, 562 p. 189 illus. online resource.
- Security and Cryptology, 7428 2946-1863 ; .
- Security and Cryptology, 7428 .
Intrusive Attacks and Countermeasures -- Masking -- Improved Fault Attacks and Side Channel Analysis -- Leakage Resiliency and Security Analysis -- Physically Unclonable Functions -- Efficient Implementations -- Lightweight Cryptography -- We Still Love RSA -- Hardware Implementations.
This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.
9783642330278
10.1007/978-3-642-33027-8 doi
Cryptography.
Data encryption (Computer science).
Coding theory.
Information theory.
Data structures (Computer science).
Data protection.
Algorithms.
Computer science--Mathematics.
Discrete mathematics.
Cryptology.
Coding and Information Theory.
Data Structures and Information Theory.
Data and Information Security.
Algorithms.
Discrete Mathematics in Computer Science.
QA268
005.824
Intrusive Attacks and Countermeasures -- Masking -- Improved Fault Attacks and Side Channel Analysis -- Leakage Resiliency and Security Analysis -- Physically Unclonable Functions -- Efficient Implementations -- Lightweight Cryptography -- We Still Love RSA -- Hardware Implementations.
This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.
9783642330278
10.1007/978-3-642-33027-8 doi
Cryptography.
Data encryption (Computer science).
Coding theory.
Information theory.
Data structures (Computer science).
Data protection.
Algorithms.
Computer science--Mathematics.
Discrete mathematics.
Cryptology.
Coding and Information Theory.
Data Structures and Information Theory.
Data and Information Security.
Algorithms.
Discrete Mathematics in Computer Science.
QA268
005.824