0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Guide to Pairing-Based Cryptography (Paperback): Nadia El Mrabet, Marc Joye Guide to Pairing-Based Cryptography (Paperback)
Nadia El Mrabet, Marc Joye
R1,442 Discovery Miles 14 420 Ships in 12 - 17 working days

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.

Fault Analysis in Cryptography (Paperback, 2012 ed.): Marc Joye, Michael Tunstall Fault Analysis in Cryptography (Paperback, 2012 ed.)
Marc Joye, Michael Tunstall
R2,811 Discovery Miles 28 110 Ships in 10 - 15 working days

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks. Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board. This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.

Cryptographic Hardware and Embedded Systems - CHES 2004 - 6th International Workshop Cambridge, MA, USA, August 11-13, 2004,... Cryptographic Hardware and Embedded Systems - CHES 2004 - 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings (Paperback, 2004 ed.)
Marc Joye, Jean-Jaques Quisquater
R1,667 Discovery Miles 16 670 Ships in 10 - 15 working days

These are the proceedings of CHES 2004, the 6th Workshop on Cryptographic Hardware and Embedded Systems. For the ?rst time, the CHES Workshop was sponsored by the International Association for Cryptologic Research (IACR). This year, the number of submissions reached a new record. One hundred and twenty-?ve papers were submitted, of which 32 were selected for presen- tion. Each submitted paper was reviewed by at least 3 members of the program committee. We are very grateful to the program committee for their hard and e?cientworkinassemblingtheprogram.Wearealsogratefultothe108external referees who helped in the review process in their area of expertise. In addition to the submitted contributions, the program included three - vited talks, by Neil Gershenfeld (Center for Bits and Atoms, MIT) about "Ph- ical Information Security," by Isaac Chuang (Medialab, MIT) about "Quantum Cryptography," and by Paul Kocher (Cryptography Research) about "Phy- cal Attacks." It also included a rump session, chaired by Christof Paar, which featured informal talks on recent results. Asinthepreviousyears, theworkshopfocusedonallaspectsofcryptographic hardware and embedded system security. We sincerely hope that the CHES Workshop series will remain a premium forum for intellectual exchange in this area.

Topics in Cryptology -- CT-RSA 2003 - The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA April... Topics in Cryptology -- CT-RSA 2003 - The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA April 13-17, 2003, Proceedings (Paperback, 2003 ed.)
Marc Joye
R1,643 Discovery Miles 16 430 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2003, CT-RSA 2003, held in San Francisco, CA, USA, in April 2003. The 26 revised full papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on key self-protection, message authentication, digital signatures, pairing based cryptography, multivariate and lattice problems, cryptographic architectures, new RSA-based cryptosystems, chosen-ciphertext security, broadcast encryption and PRF sharing, authentication structures, elliptic curves and pairings, threshold cryptography, and implementation issues.

Guide to Pairing-Based Cryptography (Hardcover): Nadia El Mrabet, Marc Joye Guide to Pairing-Based Cryptography (Hardcover)
Nadia El Mrabet, Marc Joye
R2,572 Discovery Miles 25 720 Ships in 12 - 17 working days

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.

Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26,... Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings (Paperback, 1st ed. 2017)
Marc Joye, Abderrahmane Nitaj
R2,117 Discovery Miles 21 170 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017. The 13 papers presented in this book were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptographic schemes, side-channel analysis, differential cryptanalysis, applications, and number theory.

Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014.... Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Marc Joye, Amir Moradi
R2,198 Discovery Miles 21 980 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography and leakage and fault attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Prisoner 913 - The Release Of Nelson…
Riaan de Villiers, Jan-Ad Stemmet Paperback R399 R343 Discovery Miles 3 430
The Truth About Cape Slavery - The…
Patric Tariq Mellet Paperback R330 R240 Discovery Miles 2 400
Decolonising The University
Gurminder K Bhambra, Dalia Gebrial, … Paperback  (7)
R505 R451 Discovery Miles 4 510
Robert - A Queer And Crooked Memoir For…
Robert Hamblin Paperback  (1)
R335 R288 Discovery Miles 2 880
Winged Messenger - Running Your First…
Bruce Fordyce Paperback  (1)
R220 R172 Discovery Miles 1 720
Chris van Wyk: Irascible Genius - A…
Kevin van Wyk Paperback R360 R255 Discovery Miles 2 550
Sabotage - Eskom Under Siege
Kyle Cowan Paperback  (2)
R320 R250 Discovery Miles 2 500
Breaking Bread - A Memoir
Jonathan Jansen Paperback R330 R220 Discovery Miles 2 200
Inside The Belly Of The Beast - The Real…
Angelo Agrizzi Paperback  (1)
R277 Discovery Miles 2 770
Wits University At 100 - From Excavation…
Wits Communications Paperback R390 R305 Discovery Miles 3 050

 

Partners