0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Fault Analysis in Cryptography (Paperback, 2012 ed.): Marc Joye, Michael Tunstall Fault Analysis in Cryptography (Paperback, 2012 ed.)
Marc Joye, Michael Tunstall
R2,896 Discovery Miles 28 960 Ships in 10 - 15 working days

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks. Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board. This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2... Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings (Paperback, Edition.)
Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
R1,552 Discovery Miles 15 520 Ships in 10 - 15 working days

These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12-14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi?cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a?liations of the authors, and the authors were not told which committee members reviewed which papers. The Program Committee meeting was held electronically, holding intensive discussions over a periodoftwo weeks.Of the papers submitted, 20 full papersand 10shortpapers were selected for presentation at the workshop. This workshop was sponsored by Vodaphone, who also provided a best - per award. We would like to thank this organization for their support, which helped make this workshop possible. Their continued support helps to reduce registration fees and make WISTP a continuing success. WISTP 2010 was also organized in cooperation with the International - sociation for Cryptologic Research (IACR), the IFIP WG 11.2 Pervasive S- tems Security, and ACM SIGSAC. Their support has signi?cantly contributed to raising the pro?le of WISTP, which is re?ected in the number of high-quality submissions that we received.

Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016,... Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Kerstin Lemke-Rust, Michael Tunstall
R2,273 Discovery Miles 22 730 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Smart Card Research and Advanced Applications, CARDIS 2016, held in Cannes, France, in November 2016. The 15 revised full papers presented in this book were carefully reviewed and selected from 29 submissions. The focus of the conference was on all aspects of the design, development, deployment, validation, and application of smart cards or smart personal devices.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Friends in Council - a Series of…
Arthur Helps Paperback R602 Discovery Miles 6 020
Yuck said the Yak - (Green Early Reader)
Alex English Paperback  (1)
R197 Discovery Miles 1 970
Fiscal Problems in the Single-Market…
Mario Baldassarri, Paolo Roberti Hardcover R4,379 Discovery Miles 43 790
Tokyo Dreaming
Emiko Jean Paperback R220 R200 Discovery Miles 2 000
Silke: First Touch To Tax 2025
Paperback R1,128 R1,044 Discovery Miles 10 440
The Forgers - The Forgotten Story of the…
Roger Moorhouse Paperback R478 Discovery Miles 4 780
Strat Acquisitions - A Guide to Growing…
Robinson Hardcover R1,849 R1,535 Discovery Miles 15 350
Handbook of Metaheuristics
Michel Gendreau, Jean-Yves Potvin Hardcover R5,312 Discovery Miles 53 120
The Deals Of Warren Buffett: Volume 4…
Glen Arnold Hardcover R640 R520 Discovery Miles 5 200
Canadian Birds and How to Know Them…
William T (William Thoma Macclement, George A. (George Augustus) Cornish Hardcover R1,148 Discovery Miles 11 480

 

Partners