|
Showing 1 - 7 of
7 matches in All Departments
Algebra and number theory have always been counted among the most
beautiful and fundamental mathematical areas with deep proofs and
elegant results. However, for a long time they were not considered
of any substantial importance for real-life applications. This has
dramatically changed with the appearance of new topics such as
modern cryptography, coding theory, and wireless communication.
Nowadays we find applications of algebra and number theory
frequently in our daily life. We mention security and error
detection for internet banking, check digit systems and the bar
code, GPS and radar systems, pricing options at a stock market, and
noise suppression on mobile phones as most common examples. This
book collects the results of the workshops "Applications of
algebraic curves" and "Applications of finite fields" of the RICAM
Special Semester 2013. These workshops brought together the most
prominent researchers in the area of finite fields and their
applications around the world. They address old and new problems on
curves and other aspects of finite fields, with emphasis on their
diverse applications to many areas of pure and applied mathematics.
It has been more than 20 years since the seminal publications on
side-channel attacks. They aim at extracting secrets from embedded
systems while they execute cryptographic algorithms, and they
consist of two steps, measurement and analysis. This book tackles
the analysis part, especially under situations where the targeted
device is protected by random masking. The authors explain advances
in the field and provide the reader with mathematical
formalizations. They present all known analyses within the same
notation framework, which allows the reader to rapidly understand
and learn contrasting approaches. It will be useful as a graduate
level introduction, also for self-study by researchers and
professionals, and the examples are taken from real-world datasets.
|
Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings (Paperback, 2013 ed.)
Benedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay
|
R1,468
Discovery Miles 14 680
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Third
International Conference on Security, Privacy and Applied
Cryptography Engineering held in Kharagpur, India, in October 2013.
The 12 papers presented were carefully reviewed and selected from
39 submissions. The papers are organized in topical sections on
implementations and protocols, side channel attacks and
countermeasures, identity-based identification schemes, and
signatures.
It has been more than 20 years since the seminal publications on
side-channel attacks. They aim at extracting secrets from embedded
systems while they execute cryptographic algorithms, and they
consist of two steps, measurement and analysis. This book tackles
the analysis part, especially under situations where the targeted
device is protected by random masking. The authors explain advances
in the field and provide the reader with mathematical
formalizations. They present all known analyses within the same
notation framework, which allows the reader to rapidly understand
and learn contrasting approaches. It will be useful as a graduate
level introduction, also for self-study by researchers and
professionals, and the examples are taken from real-world datasets.
This book constitutes revised selected papers from the 8th
International Workshop on Constructive Side-Channel Analysis and
Secure Design, COSADE 2017, held in Paris, France, in April 2017.
The 17 papers presented in this volume were carefully reviewed and
selected from numerous submissions. They were organized in topical
sections named: Side-Channel Attacks and Technological Effects;
Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel
Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security;
and Side-Channel Tools.
This book constitutes the thoroughly refereed post-workshop
proceedings of the 17th International Workshop on Information
Security Applications, WISA 2016, held on Jeju Island, Korea, in
August 2016. The 31 revised full papers including two invited talks
presented in this volume were carefully reviewed and selected from
61 submissions. The papers are organized in topical sections such
as network security, threat analysis, application security,
cryptographic. Protocols, cryptanalysis, cryptographic
implementations, authentication using bio and ML, authentication,
ICT Convergent security
|
Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji (Paperback, 1st ed. 2019)
Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi
|
R1,662
Discovery Miles 16 620
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the Third International
Conference on Codes, Cryptology and Information Security, C2SI
2019, held in Rabat, Morocco, in April 2019. The 19 regular papers
presented together with 5 invited talks were carefully reviewed and
selected from 90 submissions. The first aim of this conference is
to pay homage to Said El Hajji for his valuable contribution in
research, teaching and disseminating knowledge in numerical
analysis, modeling and information security in Morocco, Africa, and
worldwide. The second aim of the conference is to provide an
international forum for researchers from academia and practitioners
from industry from all over the world for discussion of all forms
of cryptology, coding theory, and information security.
|
|