Cryptographic Hardware and Embedded Systems -- CHES 2013
bAm7BQAAQBAJ
490
By:"Guido Marco Bertoni","Jean-Sébastien Coron"
"Computers"
Published on 2013-07-19 by Springer
“\u003cb\u003eBytes\u003c/b\u003e” is the public-key size ⌈k(n − k)/8⌉; the rows are sorted by this column. “\u003cbr\u003e\nTotal” is our cycle count (measured by the \u003cb\u003eIvy\u003c/b\u003e Bridge cycle counter with Turbo \u003cbr\u003e\nBoost and hyperthreading disabled) for decoding, including overhead beyond \u003cbr\u003e\nvector ...
READ NOW
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.
This Book was ranked 40 by Google Books for keyword ivy bytes.
The book is written in enfor NOT_MATURE
Read Ebook Now
false
true
Printed Version of this book available in
BOOK
Availability of Ebook version is true,"listPrice": {"amount": 95.0,"currencyCode": "USD"in falseor true
Public Domain Status false
Tidak ada komentar:
Posting Komentar