0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 12 of 12 matches in All Departments

Power Analysis Attacks - Revealing the Secrets of Smart Cards (Hardcover, 2007 ed.): Stefan Mangard, Elisabeth Oswald, Thomas... Power Analysis Attacks - Revealing the Secrets of Smart Cards (Hardcover, 2007 ed.)
Stefan Mangard, Elisabeth Oswald, Thomas Popp
R4,882 Discovery Miles 48 820 Ships in 18 - 22 working days

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, this volume provides an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles.

By analyzing the pros and cons of the different countermeasures, Power Analysis Attacks: Revealing the Secrets of Smart Cards allows practitioners to decide how to protect smart cards. This book also provides valuable information for advanced-level students, and researchers working in information security.

Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I (Paperback, 2015 ed.)
Elisabeth Oswald, Marc Fischlin
R1,553 Discovery Miles 15 530 Ships in 18 - 22 working days

The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.

Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (Paperback, 2015 ed.)
Elisabeth Oswald, Marc Fischlin
R2,804 Discovery Miles 28 040 Ships in 18 - 22 working days

The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.

Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings (Paperback, 2014 ed.)
Phong Q. Nguyen, Elisabeth Oswald
R1,524 Discovery Miles 15 240 Ships in 18 - 22 working days

This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.

Progress in Cryptology -  INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December... Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings (Paperback, 1st ed. 2020)
Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran
R2,823 Discovery Miles 28 230 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December 2020.The 39 full papers presented together with 3 invited abstracts in this book were carefully reviewed and selected from 84 submissions. Apart from its traditional focus on areas in applied and theoretical cryptology, this year INDOCRYPT solicited papers in the area of Formal Methods for Cryptographic Systems as well and much more.

Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15,... Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Francois-Xavier Standaert, Elisabeth Oswald
R1,973 Discovery Miles 19 730 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. The 12 papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named: security and physical attacks; side-channel analysis (case studies); fault analysis; and side-channel analysis (tools).

Power Analysis Attacks - Revealing the Secrets of Smart Cards (Paperback, Softcover reprint of hardcover 1st ed. 2007): Stefan... Power Analysis Attacks - Revealing the Secrets of Smart Cards (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Stefan Mangard, Elisabeth Oswald, Thomas Popp
R4,709 Discovery Miles 47 090 Ships in 18 - 22 working days

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, the authors provide an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles. By analyzing the pros and cons of the different countermeasures, this volume allows practitioners to decide how to protect smart cards.

Sowing - Legendary Farmer: Book 3 (Paperback): Elizabeth Oswald Sowing - Legendary Farmer: Book 3 (Paperback)
Elizabeth Oswald
R468 Discovery Miles 4 680 Ships in 18 - 22 working days
Cultivation - Legendary Farmer Book Four (Paperback): Elizabeth Oswald Cultivation - Legendary Farmer Book Four (Paperback)
Elizabeth Oswald
R466 Discovery Miles 4 660 Ships in 18 - 22 working days
Harrowing - Legendary Farmer: Book 2 (Paperback): Elizabeth Oswald Harrowing - Legendary Farmer: Book 2 (Paperback)
Elizabeth Oswald
R451 Discovery Miles 4 510 Ships in 18 - 22 working days
Clearing - Legendary Farmer: Book One (Paperback): Elizabeth Oswald Clearing - Legendary Farmer: Book One (Paperback)
Elizabeth Oswald
R459 Discovery Miles 4 590 Ships in 18 - 22 working days
Addison goes to Arlington - 2.0 (Paperback): Kelly Ann Kinsella Addison goes to Arlington - 2.0 (Paperback)
Kelly Ann Kinsella; Illustrated by Stephanie Elizabeth Oswald; Jeffrey M. Miller
R257 Discovery Miles 2 570 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Christmas Nativity Set - 11 Pieces
R599 R539 Discovery Miles 5 390
Cable Guys Controller and Smartphone…
R391 Discovery Miles 3 910
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
High Expectations
Mabel CD R371 Discovery Miles 3 710
Clementoni Baby Stacking Rings
R249 Discovery Miles 2 490
Parrot Visualizer - Deluxe Presenter
R7,245 R6,745 Discovery Miles 67 450
Ideal ISS-002 Steam Iron (Steam…
R262 Discovery Miles 2 620
Salvatore Ferragamo F Black Eau De…
 (2)
R728 Discovery Miles 7 280
Peptine Pro Equine Hydrolysed Collagen…
R699 R499 Discovery Miles 4 990

 

Partners