0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed.... Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed. 2015)
Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
R3,434 Discovery Miles 34 340 Ships in 10 - 15 working days

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

Timing Channels in Cryptography - A Micro-Architectural Perspective (Hardcover, 2015 ed.): Chester Rebeiro, Debdeep... Timing Channels in Cryptography - A Micro-Architectural Perspective (Hardcover, 2015 ed.)
Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
R3,678 Discovery Miles 36 780 Ships in 10 - 15 working days

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

Security, Privacy, and Applied Cryptography Engineering - 8th International Conference, SPACE 2018, Kanpur, India, December... Security, Privacy, and Applied Cryptography Engineering - 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings (Paperback, 1st ed. 2018)
Anupam Chattopadhyay, Chester Rebeiro, Yuval Yarom
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018. The 12 full papers presented were carefully reviewed and selected from 34 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Did You Know That There's A Tunnel Under…
Lana Del Rey CD R414 Discovery Miles 4 140
Beautiful Trauma
Pink CD  (3)
R133 Discovery Miles 1 330
Moon Bag [Black]
R57 Discovery Miles 570
Vibro Shape Belt
R1,099 R726 Discovery Miles 7 260
Mellerware Swiss - Plastic Floor Fan…
R368 Discovery Miles 3 680
Coty Vanilla Musk Cologne Spray (50ml…
R852 R508 Discovery Miles 5 080
Maped Smiling Planet Scissor Vivo - on…
R26 Discovery Miles 260
Jeronimo - DIY Garden house play set…
R249 R232 Discovery Miles 2 320
Luceco A70 Classic 16W Non-Dimmable LED…
R83 Discovery Miles 830
Jabra Elite 5 Hybrid ANC True Wireless…
R2,899 R2,399 Discovery Miles 23 990

 

Partners