EUR 144,11
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
EUR 146,45
Cantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: new. Hardcover. Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and cover both theoretical and practical aspects, as well as discussing the implementation of cryptographic algorithms such as AES, RSA, ECC and post-quantum algorithms. The work is structured into three volumes, spanning forty chapters and nine parts, and is enriched with pedagogical materials and real-world case studies, designed for researchers, professionals, and students alike, offering insights into both foundational and advanced topics in the field. Embedded Cryptography 2 is dedicated to masking and cryptographic implementations, as well as hardware security. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
EUR 144,14
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
EUR 144,14
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
EUR 146,69
Cantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: new. Hardcover. Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and cover both theoretical and practical aspects, as well as discussing the implementation of cryptographic algorithms such as AES, RSA, ECC and post-quantum algorithms. The work is structured into three volumes, spanning forty chapters and nine parts, and is enriched with pedagogical materials and real-world case studies, designed for researchers, professionals, and students alike, offering insights into both foundational and advanced topics in the field. Embedded Cryptography 1 is dedicated to software side-channel attacks, hardware side-channel attacks and fault injection attacks. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
EUR 146,69
Cantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: new. Hardcover. Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and cover both theoretical and practical aspects, as well as discussing the implementation of cryptographic algorithms such as AES, RSA, ECC and post-quantum algorithms. The work is structured into three volumes, spanning forty chapters and nine parts, and is enriched with pedagogical materials and real-world case studies, designed for researchers, professionals, and students alike, offering insights into both foundational and advanced topics in the field. Embedded Cryptography 3 is dedicated to white-box cryptography, randomness and key generation, as well as real world applications and attacks in the wild. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
EUR 136,46
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
EUR 136,46
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
EUR 136,46
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: California Books, Miami, FL, Estados Unidos de America
EUR 153,96
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: California Books, Miami, FL, Estados Unidos de America
EUR 153,96
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: California Books, Miami, FL, Estados Unidos de America
EUR 153,96
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
EUR 141,27
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
EUR 141,27
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
EUR 141,27
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
EUR 156,02
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
EUR 160,02
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
EUR 160,07
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
EUR 160,10
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
EUR 160,44
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
EUR 160,43
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
EUR 168,28
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: New.
EUR 165,05
Cantidad disponible: Más de 20 disponibles
Añadir al carritoHardback. Condición: New. New copy - Usually dispatched within 4 working days. 680.
EUR 165,05
Cantidad disponible: Más de 20 disponibles
Añadir al carritoHardback. Condición: New. New copy - Usually dispatched within 4 working days. 680.
EUR 165,05
Cantidad disponible: Más de 20 disponibles
Añadir al carritoHardback. Condición: New. New copy - Usually dispatched within 4 working days. 680.
EUR 182,14
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
EUR 182,14
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
EUR 190,13
Cantidad disponible: Más de 20 disponibles
Añadir al carritoHardback. Condición: New. Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and cover both theoretical and practical aspects, as well as discussing the implementation of cryptographic algorithms such as AES, RSA, ECC and post-quantum algorithms. The work is structured into three volumes, spanning forty chapters and nine parts, and is enriched with pedagogical materials and real-world case studies, designed for researchers, professionals, and students alike, offering insights into both foundational and advanced topics in the field. Embedded Cryptography 3 is dedicated to white-box cryptography, randomness and key generation, as well as real world applications and attacks in the wild.
EUR 183,00
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
EUR 190,83
Cantidad disponible: Más de 20 disponibles
Añadir al carritoHardback. Condición: New. Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and cover both theoretical and practical aspects, as well as discussing the implementation of cryptographic algorithms such as AES, RSA, ECC and post-quantum algorithms. The work is structured into three volumes, spanning forty chapters and nine parts, and is enriched with pedagogical materials and real-world case studies, designed for researchers, professionals, and students alike, offering insights into both foundational and advanced topics in the field. Embedded Cryptography 1 is dedicated to software side-channel attacks, hardware side-channel attacks and fault injection attacks.