Side Channel Attacks
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-ba...
Saved in:
Main Author: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
MDPI - Multidisciplinary Digital Publishing Institute
2019
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_59342 | ||
005 | 20210212 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210212s2019 xx |||||o ||| 0|eng d | ||
020 | |a books978-3-03921-001-5 | ||
020 | |a 9783039210008 | ||
020 | |a 9783039210015 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.3390/books978-3-03921-001-5 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a TBX |2 bicssc | |
100 | 1 | |a Hong, Seokhie |4 auth | |
245 | 1 | 0 | |a Side Channel Attacks |
260 | |b MDPI - Multidisciplinary Digital Publishing Institute |c 2019 | ||
300 | |a 1 electronic resource (258 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-nc-nd/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ | ||
546 | |a English | ||
650 | 7 | |a History of engineering & technology |2 bicssc | |
653 | |a n/a | ||
653 | |a binary Huff curve | ||
653 | |a FPGA | ||
653 | |a post quantum cryptography | ||
653 | |a data loss | ||
653 | |a side-channel cache attacks | ||
653 | |a rsa cryptosystem | ||
653 | |a first-order analysis | ||
653 | |a chaotic circuit | ||
653 | |a integrity | ||
653 | |a ad libraries | ||
653 | |a power-analysis attack | ||
653 | |a single trace analysis | ||
653 | |a side-channel authentication | ||
653 | |a provable security | ||
653 | |a ad lib | ||
653 | |a cache misses | ||
653 | |a cache side-channel attack | ||
653 | |a leakage model | ||
653 | |a NTRU | ||
653 | |a graph | ||
653 | |a AES | ||
653 | |a hardware security | ||
653 | |a recovery of secret exponent by triangular trace analysis | ||
653 | |a side-channel attacks | ||
653 | |a information leakage | ||
653 | |a data outsourcing | ||
653 | |a CPLD | ||
653 | |a scatter-gather implementation | ||
653 | |a modular exponentiation | ||
653 | |a lattice-based cryptography | ||
653 | |a elliptic curve cryptography | ||
653 | |a Gaussian sampling | ||
653 | |a post-quantum cryptography | ||
653 | |a reliability | ||
653 | |a unified point addition | ||
653 | |a ad networks | ||
653 | |a graph similarity | ||
653 | |a mobile ads | ||
653 | |a physically unclonable function | ||
653 | |a tweakable block cipher | ||
653 | |a Merkle (hash) tree | ||
653 | |a machine-learning classification | ||
653 | |a side channel attack | ||
653 | |a online authentication | ||
653 | |a side channel analysis | ||
653 | |a financial IC card | ||
653 | |a side-channel attack | ||
653 | |a re-keying | ||
653 | |a cloud computing | ||
653 | |a cryptographic keys | ||
653 | |a chaos theory | ||
653 | |a horizontal collision correlation analysis | ||
653 | |a countermeasure | ||
653 | |a embedded system security | ||
653 | |a cache attack | ||
653 | |a single-trace attack | ||
653 | |a software development kit (SDK) | ||
653 | |a CDT sampling | ||
653 | |a key bit-dependent attack | ||
653 | |a side-channel analysis | ||
653 | |a second-order analysis | ||
653 | |a constant-time cryptographic algorithm | ||
653 | |a android package (APK) | ||
653 | |a challenge-response authentication | ||
856 | 4 | 0 | |a www.oapen.org |u https://mdpi.com/books/pdfview/book/1339 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/59342 |7 0 |z DOAB: description of the publication |