0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12,... Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Josep Balasch, Colin O'flynn
R2,168 Discovery Miles 21 680 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022. The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The papers cover the following subjects: implementation attacks, secure implementation, implementation attack-resilient architectures and schemes, secure design and evaluation, practical attacks, test platforms, and open benchmarks.

Selected Areas in Cryptography - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020,... Selected Areas in Cryptography - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Orr Dunkelman, Michael J. Jacobson, Jr., Colin O'flynn
R1,673 Discovery Miles 16 730 Ships in 10 - 15 working days

This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27 full papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions

The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback): Jasper van Woudenberg, Colin... The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback)
Jasper van Woudenberg, Colin O'flynn
R1,035 R963 Discovery Miles 9 630 Save R72 (7%) Ships in 12 - 17 working days

The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Legend Of Zola Mahobe - And The…
Don Lepati, Nikolaos Kirkinis Paperback  (1)
R360 R309 Discovery Miles 3 090
Staedtler Noris Watercolour Paint Box…
R66 R49 Discovery Miles 490
Cadac 47cm Paella Pan
R1,215 Discovery Miles 12 150
ZA Key ring - Gun Metal
R199 Discovery Miles 1 990
Safari Nation - A Social History Of The…
Jacob Dlamini Paperback R320 R250 Discovery Miles 2 500
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Wonder Wondersol Colour Boost Plant Food…
R122 Discovery Miles 1 220
Nintendo Joy-Con Neon Controller Pair…
R1,899 R1,729 Discovery Miles 17 290
Ergo Height Adjustable Monitor Stand
R439 R249 Discovery Miles 2 490
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680

 

Partners