Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 83,33
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: California Books, Miami, FL, U.S.A.
EUR 85,67
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 88,94
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 91,04
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 92,36
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Lingua: Inglese
Editore: Springer Nature Switzerland AG, CH, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 113,56
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Lingua: Inglese
Editore: VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. 232.
Lingua: Inglese
Editore: Springer-Nature New York Inc, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Da: Revaluation Books, Exeter, Regno Unito
EUR 115,81
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 620 pages. 9.25x6.10x9.21 inches. In Stock.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Da: preigu, Osnabrück, Germania
EUR 64,80
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. On the Physical Security of Cryptographic Implementations | Matthieu Rivain | Taschenbuch | 232 S. | Englisch | 2014 | LAP LAMBERT Academic Publishing | EAN 9783659263842 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 79,17
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2 4, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography;Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning.
Lingua: Inglese
Editore: Springer Nature Switzerland AG, CH, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Da: Rarewaves.com UK, London, Regno Unito
EUR 104,67
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 65,43
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: new. Questo è un articolo print on demand.
Lingua: Inglese
Editore: Springer Nature Switzerland AG, Cham, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 24, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing Mär 2014, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 76,90
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption) queries according to a secret value: the key. The security of the cryptosystem is then defined following a simple game. An adversary questions the oracle about the encryption (and/or decryption) of messages of its choice and, depending on the answers, attempts to recover the value of the secret key (or to encrypt/decrypt a message for which he did not query the oracle). If by following an optimal strategy the adversary only has a negligible chance of winning, the system is considered as secure. Several cryptosystems have been proved secure in the black-box model. However, this model is not always sufficient to ensure the security of a cryptosystem in practice. Let us consider the example of smart cards which are used as platforms for cryptosystems in various applications such as banking, access control, mobile telephony, pay TV, or electronic passport. By the very nature of these applications, a cryptosystem embedded on a smart card is physically accessible [.] 232 pp. Englisch.
Lingua: Inglese
Editore: Springer, Springer Okt 2025, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 79,17
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2 4, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography;Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. 616 pp. Englisch.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Da: moluna, Greven, Germania
EUR 61,85
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Rivain MatthieuMatthieu Rivain received his PhD from University of Luxembourg in 2009. During his PhD study he was working as an engineer in cryptography within Oberthur Card Systems, and in 2010 Matthieu joined CryptoExperts. His fi.
Da: moluna, Greven, Germania
EUR 69,98
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt.
Lingua: Inglese
Editore: VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Da: Majestic Books, Hounslow, Regno Unito
EUR 120,60
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand pp. 232 2:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on Creme w/Gloss Lam.
Lingua: Inglese
Editore: Springer Nature Switzerland AG, Cham, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Da: CitiRetail, Stevenage, Regno Unito
EUR 91,05
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 24, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Lingua: Inglese
Editore: VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 122,86
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. PRINT ON DEMAND pp. 232.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing Mär 2014, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 76,90
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption) queries according to a secret value: the key. The security of the cryptosystem is then defined following a simple game. An adversary questions the oracle about the encryption (and/or decryption) of messages of its choice and, depending on the answers, attempts to recover the value of the secret key (or to encrypt/decrypt a message for which he did not query the oracle). If by following an optimal strategy the adversary only has a negligible chance of winning, the system is considered as secure. Several cryptosystems have been proved secure in the black-box model. However, this model is not always sufficient to ensure the security of a cryptosystem in practice. Let us consider the example of smart cards which are used as platforms for cryptosystems in various applications such as banking, access control, mobile telephony, pay TV, or electronic passport. By the very nature of these applications, a cryptosystem embedded on a smart card is physically accessible [.]VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 232 pp. Englisch.
Lingua: Inglese
Editore: LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659263842 ISBN 13: 9783659263842
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 76,90
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption) queries according to a secret value: the key. The security of the cryptosystem is then defined following a simple game. An adversary questions the oracle about the encryption (and/or decryption) of messages of its choice and, depending on the answers, attempts to recover the value of the secret key (or to encrypt/decrypt a message for which he did not query the oracle). If by following an optimal strategy the adversary only has a negligible chance of winning, the system is considered as secure. Several cryptosystems have been proved secure in the black-box model. However, this model is not always sufficient to ensure the security of a cryptosystem in practice. Let us consider the example of smart cards which are used as platforms for cryptosystems in various applications such as banking, access control, mobile telephony, pay TV, or electronic passport. By the very nature of these applications, a cryptosystem embedded on a smart card is physically accessible [.].
Lingua: Inglese
Editore: Springer, Springer Okt 2025, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 79,17
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -.-Attacks on Symmetric Cryptography.- The Dangerous Message/Key Swap in HMAC.- Practical Second-Order CPA Attack on Ascon with Proper SelectionFunction.- Side-Channel Attacks.- On the Success Rate of Simple Side-Channel Attacks against Maskingwith Unlimited Attack Traces.- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.- Physical Security.- Robust and Reliable PUF Protocol Exploiting Non-MonotonicQuantization and Neyman-Pearson Lemma.- Towards Package Opening Detection at Power-up by MonitoringThermal Dissipation.- Partial Key Overwrite Attacks in Microcontrollers: a Survey.- RISC-V.- Combined Masking and Shuffling for Side-Channel Secure Ascon onRISC-V.- A Hardware Design Methodology to Prevent MicroarchitecturalTransition Leakages.- Machine Learning.- Taking AI-Based Side-Channel Attacks to a New Dimension.- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection forDeep Learning-based Side-Channel Analysis.- Improving Leakage Exploitability in Horizontal Side Channel Attacksthrough Anomaly Mitigation with Unsupervised Neural Networks.- Profiling Side-Channel Attack on HQC Polynomial MultiplicationUsing Machine Learning Methods.- Attacks on Post-Quantum Cryptography.- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM.- A Horizontal Attack on the Codes and Restricted Objects SignatureScheme (CROSS).- Vladimir Sarde and Nicolas Debande.- Message-Recovery Horizontal Correlation Attack on Classic McEliece.- Breaking HuFu with 0 Leakage: A Side-Channel Analysis.- Securing Post-Quantum Cryptography.- X2X: Low-Randomness and High-Throughput A2B and B2Aconversions for d+1 shares in Hardware.- Area Efficient Polynomial Arithmetic Accelerator for Post-QuantumDigital Signatures and KEMs.- Efficient Error Detection Methods for the Number Theoretic Transformsin Lattice-Based Algorithms.- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation.- Homomorphic Encryption and White-Box Cryptography.- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks.- White-Box Implementation Techniques for the HFE Family.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 616 pp. Englisch.
Lingua: Inglese
Editore: Springer Nature Switzerland AG, Cham, 2025
ISBN 10: 3032014042 ISBN 13: 9783032014047
Da: AussieBookSeller, Truganina, VIC, Australia
EUR 125,03
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 24, 2025.The 24 full papers included in this book were carefully reviewed and selected from 51 submissions. They are organized in topical sections as follows: Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; Machine Learning; Attacks on Post-Quantum Cryptography; Securing Post-Quantum Cryptography; Homomorphic Encryption and White-Box Cryptography; Attacks on Symmetric Cryptography; Side-Channel Attacks; Physical Security; RISC-V; and Machine Learning. This item is printed on demand. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.