0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12,... Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Josep Balasch, Colin O'flynn
R1,972 Discovery Miles 19 720 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022. The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The papers cover the following subjects: implementation attacks, secure implementation, implementation attack-resilient architectures and schemes, secure design and evaluation, practical attacks, test platforms, and open benchmarks.

Selected Areas in Cryptography - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020,... Selected Areas in Cryptography - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Orr Dunkelman, Michael J. Jacobson, Jr., Colin O'flynn
R1,528 Discovery Miles 15 280 Ships in 18 - 22 working days

This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27 full papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions

The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback): Jasper van Woudenberg, Colin... The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback)
Jasper van Woudenberg, Colin O'flynn
R992 R887 Discovery Miles 8 870 Save R105 (11%) Ships in 10 - 15 working days

The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dealing In Death - Ellen Pakkies And A…
Sylvia Walker Paperback R262 Discovery Miles 2 620
Sabotage - Eskom Under Siege
Kyle Cowan Paperback  (2)
R340 R314 Discovery Miles 3 140
The Definitive Handbook of Business…
A Hiles Hardcover R1,265 Discovery Miles 12 650
Reforesting the Soul - Meditating with…
Andrew D Mayes Hardcover R795 R694 Discovery Miles 6 940
How Stella Learned To Talk - The…
Christina Hunger Paperback R396 Discovery Miles 3 960
We Took the Risk - The Stories Behind…
Tom Weirich Hardcover R681 R615 Discovery Miles 6 150
Bluetick Coonhound Tricks Training…
Training Central Paperback R478 Discovery Miles 4 780
Koning Kat (L19&20) Graad 5 - Huistaal…
Jill Eggleton R99 R92 Discovery Miles 920
Pj's Ponies
Pam Honeycutt Hardcover R622 Discovery Miles 6 220
Wie's Wie? (L15&16) Graad 3 - Huistaal…
Jill Eggleton R99 R92 Discovery Miles 920

 

Partners