Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 83,73
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: California Books, Miami, FL, Estados Unidos de America
EUR 86,08
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 89,36
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 92,86
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 91,51
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por Springer Nature Switzerland AG, CH, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
EUR 111,93
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback. Condición: New.
Idioma: Inglés
Publicado por VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 119,55
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. pp. 232.
Idioma: Inglés
Publicado por Springer-Nature New York Inc, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Librería: Revaluation Books, Exeter, Reino Unido
EUR 117,20
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 620 pages. 9.25x6.10x9.21 inches. In Stock.
Idioma: Inglés
Publicado por LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Librería: preigu, Osnabrück, Alemania
EUR 64,80
Cantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. On the Physical Security of Cryptographic Implementations | Matthieu Rivain | Taschenbuch | 232 S. | Englisch | 2014 | LAP LAMBERT Academic Publishing | EAN 9783659263842 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Librería: preigu, Osnabrück, Alemania
EUR 71,85
Cantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Constructive Approaches for Security Analysis and Design of Embedded Systems | First International Conference, CASCADE 2025, Saint-Etienne, France, April 2-4, 2025, Proceedings | Matthieu Rivain (u. a.) | Taschenbuch | Lecture Notes in Computer Science | xi | Englisch | 2025 | Springer | EAN 9783032014047 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 79,17
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2 4, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography;Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.
Idioma: Inglés
Publicado por Springer Nature Switzerland AG, CH, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Librería: Rarewaves.com UK, London, Reino Unido
EUR 105,21
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback. Condición: New.
Librería: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 65,43
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: new. Questo è un articolo print on demand.
Idioma: Inglés
Publicado por Springer Nature Switzerland AG, Cham, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
EUR 93,76
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 24, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Idioma: Inglés
Publicado por LAP LAMBERT Academic Publishing Mär 2014, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 76,90
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption) queries according to a secret value: the key. The security of the cryptosystem is then defined following a simple game. An adversary questions the oracle about the encryption (and/or decryption) of messages of its choice and, depending on the answers, attempts to recover the value of the secret key (or to encrypt/decrypt a message for which he did not query the oracle). If by following an optimal strategy the adversary only has a negligible chance of winning, the system is considered as secure. Several cryptosystems have been proved secure in the black-box model. However, this model is not always sufficient to ensure the security of a cryptosystem in practice. Let us consider the example of smart cards which are used as platforms for cryptosystems in various applications such as banking, access control, mobile telephony, pay TV, or electronic passport. By the very nature of these applications, a cryptosystem embedded on a smart card is physically accessible [.] 232 pp. Englisch.
Idioma: Inglés
Publicado por Springer, Springer Okt 2025, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 79,17
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2 4, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography;Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. 616 pp. Englisch.
Idioma: Inglés
Publicado por LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Librería: moluna, Greven, Alemania
EUR 61,85
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Rivain MatthieuMatthieu Rivain received his PhD from University of Luxembourg in 2009. During his PhD study he was working as an engineer in cryptography within Oberthur Card Systems, and in 2010 Matthieu joined CryptoExperts. His fi.
Librería: moluna, Greven, Alemania
EUR 69,98
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt.
Idioma: Inglés
Publicado por VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Librería: Majestic Books, Hounslow, Reino Unido
EUR 121,18
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. Print on Demand pp. 232 2:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on Creme w/Gloss Lam.
Idioma: Inglés
Publicado por Springer Nature Switzerland AG, Cham, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Librería: CitiRetail, Stevenage, Reino Unido
EUR 91,52
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 24, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Idioma: Inglés
Publicado por VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 122,86
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. PRINT ON DEMAND pp. 232.
Idioma: Inglés
Publicado por LAP LAMBERT Academic Publishing Mär 2014, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 76,90
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - Print on Demand Titel. Neuware -In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption) queries according to a secret value: the key. The security of the cryptosystem is then defined following a simple game. An adversary questions the oracle about the encryption (and/or decryption) of messages of its choice and, depending on the answers, attempts to recover the value of the secret key (or to encrypt/decrypt a message for which he did not query the oracle). If by following an optimal strategy the adversary only has a negligible chance of winning, the system is considered as secure. Several cryptosystems have been proved secure in the black-box model. However, this model is not always sufficient to ensure the security of a cryptosystem in practice. Let us consider the example of smart cards which are used as platforms for cryptosystems in various applications such as banking, access control, mobile telephony, pay TV, or electronic passport. By the very nature of these applications, a cryptosystem embedded on a smart card is physically accessible [.]VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 232 pp. Englisch.
Idioma: Inglés
Publicado por LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 76,90
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption) queries according to a secret value: the key. The security of the cryptosystem is then defined following a simple game. An adversary questions the oracle about the encryption (and/or decryption) of messages of its choice and, depending on the answers, attempts to recover the value of the secret key (or to encrypt/decrypt a message for which he did not query the oracle). If by following an optimal strategy the adversary only has a negligible chance of winning, the system is considered as secure. Several cryptosystems have been proved secure in the black-box model. However, this model is not always sufficient to ensure the security of a cryptosystem in practice. Let us consider the example of smart cards which are used as platforms for cryptosystems in various applications such as banking, access control, mobile telephony, pay TV, or electronic passport. By the very nature of these applications, a cryptosystem embedded on a smart card is physically accessible [.].
Idioma: Inglés
Publicado por Springer, Springer Okt 2025, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 79,17
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - Print on Demand Titel. Neuware -.-Attacks on Symmetric Cryptography.- The Dangerous Message/Key Swap in HMAC.- Practical Second-Order CPA Attack on Ascon with Proper SelectionFunction.- Side-Channel Attacks.- On the Success Rate of Simple Side-Channel Attacks against Maskingwith Unlimited Attack Traces.- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.- Physical Security.- Robust and Reliable PUF Protocol Exploiting Non-MonotonicQuantization and Neyman-Pearson Lemma.- Towards Package Opening Detection at Power-up by MonitoringThermal Dissipation.- Partial Key Overwrite Attacks in Microcontrollers: a Survey.- RISC-V.- Combined Masking and Shuffling for Side-Channel Secure Ascon onRISC-V.- A Hardware Design Methodology to Prevent MicroarchitecturalTransition Leakages.- Machine Learning.- Taking AI-Based Side-Channel Attacks to a New Dimension.- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection forDeep Learning-based Side-Channel Analysis.- Improving Leakage Exploitability in Horizontal Side Channel Attacksthrough Anomaly Mitigation with Unsupervised Neural Networks.- Profiling Side-Channel Attack on HQC Polynomial MultiplicationUsing Machine Learning Methods.- Attacks on Post-Quantum Cryptography.- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM.- A Horizontal Attack on the Codes and Restricted Objects SignatureScheme (CROSS).- Vladimir Sarde and Nicolas Debande.- Message-Recovery Horizontal Correlation Attack on Classic McEliece.- Breaking HuFu with 0 Leakage: A Side-Channel Analysis.- Securing Post-Quantum Cryptography.- X2X: Low-Randomness and High-Throughput A2B and B2Aconversions for d+1 shares in Hardware.- Area Efficient Polynomial Arithmetic Accelerator for Post-QuantumDigital Signatures and KEMs.- Efficient Error Detection Methods for the Number Theoretic Transformsin Lattice-Based Algorithms.- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation.- Homomorphic Encryption and White-Box Cryptography.- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks.- White-Box Implementation Techniques for the HFE Family.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 616 pp. Englisch.
Idioma: Inglés
Publicado por Springer Nature Switzerland AG, Cham, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Librería: AussieBookSeller, Truganina, VIC, Australia
EUR 124,63
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 24, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. This item is printed on demand. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.