0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Timing Channels in Cryptography - A Micro-Architectural Perspective (Hardcover, 2015 ed.): Chester Rebeiro, Debdeep... Timing Channels in Cryptography - A Micro-Architectural Perspective (Hardcover, 2015 ed.)
Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
R3,749 R3,467 Discovery Miles 34 670 Save R282 (8%) Ships in 12 - 19 working days

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed.... Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed. 2015)
Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
R3,315 Discovery Miles 33 150 Ships in 10 - 15 working days

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Teddy Junior Acrylic Paint - Pearl Gold…
R53 Discovery Miles 530
Stewart Modern Camel: Large - Waverley…
Ron Grosset Hardcover R465 Discovery Miles 4 650
Eleanor Roosevelt and the Anti-Nuclear…
Dario Fazzi Hardcover R3,120 Discovery Miles 31 200
Interstellar Boundary Explorer (IBEX)
David McComas, Gary Zank, … Hardcover R4,398 Discovery Miles 43 980
Large Print Puzzles - Crossword
Hinkler Books Hinkler Books Paperback R99 R90 Discovery Miles 900
Armed Groups - The 21st Century Threat
Peter G Thompson Paperback R1,235 Discovery Miles 12 350
Joy For The Journey - Coloring Book
Amylee Weeks Spiral bound R316 R297 Discovery Miles 2 970
Opposing Perspectives on the Drone…
B. Strawser, L. Hajjar, … Hardcover R2,016 R1,915 Discovery Miles 19 150
Memoirs of the Court of King James the…
Lucy Aikin Paperback R675 Discovery Miles 6 750
Dala Craft Acrylic - 7 Red (50ml)
R20 Discovery Miles 200

 

Partners