000 | 04472nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-030-42068-0 | ||
003 | DE-He213 | ||
005 | 20240730165621.0 | ||
007 | cr nn 008mamaa | ||
008 | 200218s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030420680 _9978-3-030-42068-0 |
||
024 | 7 |
_a10.1007/978-3-030-42068-0 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aSmart Card Research and Advanced Applications _h[electronic resource] : _b18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers / _cedited by Sonia Belaïd, Tim Güneysu. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aX, 269 p. 106 illus., 50 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11833 |
|
505 | 0 | _aSystem-on-a-Chip Security -- In-situ Extraction of Randomness from Computer Architecture through Hardware Performance Counters -- Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Latency and Low-Energy Applications -- Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance -- Post-Quantum Cryptography -- Improving Speed of Dilithium's Signing Procedure -- An efficient and provable masked implementation of qtesla -- Side-Channel Analysis -- Side-channel attacks on blinded scalar multiplications revisited -- Remote Side-Channel Attacks on Heterogeneous SoC -- Optimal Collision Side-Channel Attacks -- Microarchitectural Attacks -- A Bit-Level Approach to Side Channel Based Disassembling -- CCCiCC: A Cross-core Cache-independent Covert Channel on AMD Family 15h CPUs -- Design Considerations for EM Pulse Fault Injection -- Cryptographic Primitives -- Lightweight MACs from Universal Hash Functions -- FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms -- Advances in Side-Channel Analysis -- A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis -- Key Enumeration from the Adversarial Viewpoint. When to Stop Measuring and Start Enumerating?. | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Smart Card Research and Advanced Applications, CARDIS 2019, held in Prague, Czech Republic, in November 2019. The 15 revised full papers presented in this book were carefully reviewed and selected from 31 submissions. The papers are organized in the following topical sections: system-on-a-chip security; post-quantum cryptography; side-channel analysis; microarchitectural attacks; cryptographic primitives; advances in side-channel analysis. CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aApplication software. _989837 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aMicroprogramming . _932081 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _989838 |
650 | 2 | 4 |
_aComputer Communication Networks. _989839 |
650 | 2 | 4 |
_aControl Structures and Microprogramming. _932083 |
700 | 1 |
_aBelaïd, Sonia. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989840 |
|
700 | 1 |
_aGüneysu, Tim. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989841 |
|
710 | 2 |
_aSpringerLink (Online service) _989842 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030420673 |
776 | 0 | 8 |
_iPrinted edition: _z9783030420697 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11833 _989843 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-42068-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86430 _d86430 |