0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Timing Channels in Cryptography - A Micro-Architectural Perspective (Hardcover, 2015 ed.): Chester Rebeiro, Debdeep... Timing Channels in Cryptography - A Micro-Architectural Perspective (Hardcover, 2015 ed.)
Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
R3,824 R3,535 Discovery Miles 35 350 Save R289 (8%) Ships in 12 - 19 working days

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed.... Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed. 2015)
Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
R3,485 Discovery Miles 34 850 Ships in 10 - 15 working days

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Teaching Mathematics in the Foundation…
C. Meier, M Naude Paperback  (1)
R232 Discovery Miles 2 320
Handbook on Tourism and Social Media
Dogan Gursoy, Rahul P.S. Kaurav Hardcover R6,870 Discovery Miles 68 700
Advanced Statistics for Physical and…
Thomas Gus Almonroeder Hardcover R4,572 Discovery Miles 45 720
The Land Is Ours - Black Lawyers And The…
Tembeka Ngcukaitobi Paperback  (11)
R400 R360 Discovery Miles 3 600
A Research Agenda for Gender and Tourism
Erica Wilson, Donna Chambers Hardcover R3,269 Discovery Miles 32 690
Your Anxiety Journal - Simple Exercises…
Amy Birch Paperback R305 R258 Discovery Miles 2 580
Colonialism, Tourism and Place - Global…
Denis Linehan, Ian D. Clark, … Hardcover R3,087 Discovery Miles 30 870
The Can't Sleep Colouring Journal
Sarah Jane Arnold Paperback R250 Discovery Miles 2 500
The South African Mining Journal, Vol…
unknownauthor Paperback R421 Discovery Miles 4 210
Write from the start - Unique Programme…
Ion Teodorescu, Lois Addy Paperback R1,347 R1,103 Discovery Miles 11 030

 

Partners