0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12,... Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Josep Balasch, Colin O'flynn
R2,134 Discovery Miles 21 340 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022. The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The papers cover the following subjects: implementation attacks, secure implementation, implementation attack-resilient architectures and schemes, secure design and evaluation, practical attacks, test platforms, and open benchmarks.

Selected Areas in Cryptography - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020,... Selected Areas in Cryptography - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Orr Dunkelman, Michael J. Jacobson, Jr., Colin O'flynn
R1,652 Discovery Miles 16 520 Ships in 10 - 15 working days

This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27 full papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions

The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback): Jasper van Woudenberg, Colin... The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback)
Jasper van Woudenberg, Colin O'flynn
R1,056 R891 Discovery Miles 8 910 Save R165 (16%) Ships in 12 - 19 working days

The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Knowledge Cartography - Software Tools…
Alexandra Okada, Simon J. Buckingham-Shum, … Hardcover R2,967 Discovery Miles 29 670
Colour, Class And Community - The Natal…
Ashwin Desai, Goolam Vahed Paperback R420 R388 Discovery Miles 3 880
Object-Teaching, or Words and Things…
T. G. Rooper Hardcover R640 R556 Discovery Miles 5 560
The Role of Multinational Enterprises in…
John R McIntyre, Silvester Ivanaj, … Hardcover R4,005 Discovery Miles 40 050
Insectopedia - The Secret World of…
Erik Holm Paperback  (3)
R350 R323 Discovery Miles 3 230
Business Ethics
Deon Rossouw, Leon van Vuuren Paperback R633 Discovery Miles 6 330
Birds Of Southern Africa - The Complete…
Burger Cillie, Niel Cillie, … Paperback  (13)
R695 R597 Discovery Miles 5 970
The Elements of French and English…
John Perrin Paperback R491 Discovery Miles 4 910
International Arbitration and the…
Maxi Scherer, Niuscha Bassiri, … Hardcover R5,958 Discovery Miles 59 580
The Queen's English - Stray Notes on…
Henry Alford Paperback R528 Discovery Miles 5 280

 

Partners