Published by VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Language: English
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 232.
Published by Springer-Nature New York Inc, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Language: English
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 620 pages. 9.25x6.10x9.21 inches. In Stock.
Condition: New.
Taschenbuch. Condition: Neu. Constructive Approaches for Security Analysis and Design of Embedded Systems | First International Conference, CASCADE 2025, Saint-Etienne, France, April 2-4, 2025, Proceedings | Matthieu Rivain (u. a.) | Taschenbuch | xi | Englisch | 2025 | Springer | EAN 9783032014047 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2 4, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography;Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.
Seller: Brook Bookstore On Demand, Napoli, NA, Italy
Condition: new. Questo è un articolo print on demand.
Published by Springer Nature Switzerland AG, Cham, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Language: English
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 24, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Published by LAP LAMBERT Academic Publishing Mär 2014, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Language: English
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption) queries according to a secret value: the key. The security of the cryptosystem is then defined following a simple game. An adversary questions the oracle about the encryption (and/or decryption) of messages of its choice and, depending on the answers, attempts to recover the value of the secret key (or to encrypt/decrypt a message for which he did not query the oracle). If by following an optimal strategy the adversary only has a negligible chance of winning, the system is considered as secure. Several cryptosystems have been proved secure in the black-box model. However, this model is not always sufficient to ensure the security of a cryptosystem in practice. Let us consider the example of smart cards which are used as platforms for cryptosystems in various applications such as banking, access control, mobile telephony, pay TV, or electronic passport. By the very nature of these applications, a cryptosystem embedded on a smart card is physically accessible [.] 232 pp. Englisch.
Published by Springer, Springer Okt 2025, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Language: English
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2 4, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography;Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. 616 pp. Englisch.
Published by LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Language: English
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Rivain MatthieuMatthieu Rivain received his PhD from University of Luxembourg in 2009. During his PhD study he was working as an engineer in cryptography within Oberthur Card Systems, and in 2010 Matthieu joined CryptoExperts. His fi.
Published by Springer Verlag GmbH, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Language: English
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt.
Published by VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Language: English
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 232 2:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on Creme w/Gloss Lam.
Published by Springer Nature Switzerland AG, Cham, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Language: English
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 24, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Published by VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Language: English
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND pp. 232.
Published by LAP LAMBERT Academic Publishing Mär 2014, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Language: English
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption) queries according to a secret value: the key. The security of the cryptosystem is then defined following a simple game. An adversary questions the oracle about the encryption (and/or decryption) of messages of its choice and, depending on the answers, attempts to recover the value of the secret key (or to encrypt/decrypt a message for which he did not query the oracle). If by following an optimal strategy the adversary only has a negligible chance of winning, the system is considered as secure. Several cryptosystems have been proved secure in the black-box model. However, this model is not always sufficient to ensure the security of a cryptosystem in practice. Let us consider the example of smart cards which are used as platforms for cryptosystems in various applications such as banking, access control, mobile telephony, pay TV, or electronic passport. By the very nature of these applications, a cryptosystem embedded on a smart card is physically accessible [.]Books on Demand GmbH, Überseering 33, 22297 Hamburg 232 pp. Englisch.
Published by LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Language: English
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption) queries according to a secret value: the key. The security of the cryptosystem is then defined following a simple game. An adversary questions the oracle about the encryption (and/or decryption) of messages of its choice and, depending on the answers, attempts to recover the value of the secret key (or to encrypt/decrypt a message for which he did not query the oracle). If by following an optimal strategy the adversary only has a negligible chance of winning, the system is considered as secure. Several cryptosystems have been proved secure in the black-box model. However, this model is not always sufficient to ensure the security of a cryptosystem in practice. Let us consider the example of smart cards which are used as platforms for cryptosystems in various applications such as banking, access control, mobile telephony, pay TV, or electronic passport. By the very nature of these applications, a cryptosystem embedded on a smart card is physically accessible [.].
Published by Springer, Springer Okt 2025, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Language: English
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 24, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.Springer-Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 616 pp. Englisch.