Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection.- Dynamic Fault Injection Countermeasure: A New Conception of Java Card Security.- Java Card Combined Attacks with Localization-Agnostic Fault.- Improved (and Practical) Public-Key Authentication for UHF RFID. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards.- On the Use of Shamir's Secret Sharing against Side-Channel Analysis.- Secure Multiple SBoxes Implementation with Arithmetically Masked Input.- Low-Cost Countermeasure against RPA.- Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models.- On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices.- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.- Putting together What Fits together - GrĘStl.- Memory Access Pattern Protection for Resource-Constrained Devices.- Multipurpose Cryptographic Primitive ARMADILLO3.- Improving Side-Channel Analysis with Optimal Linear Transforms.- SCA with Magnitude Squared Coherence.- Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis.- Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines.- Defensive Leakage Camouflage.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want