Bøger af Debdeep Mukhopadhyay
-
708,95 kr. This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were carefully reviewed and selected from 112 sumbissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols; cryptanalysis/side channel attacks; and cipher primitives.
- Bog
- 708,95 kr.
-
- Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings
516,95 kr. This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.
- Bog
- 516,95 kr.
-
1.589,95 kr. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods.
- Bog
- 1.589,95 kr.
-
- A Micro-Architectural Perspective
1.232,95 - 1.298,95 kr. This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers.
- Bog
- 1.232,95 kr.
-
- Design, Threats, and Safeguards
1.726,95 kr. Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis. Presenting state-of-the-art research and strategies for the design of very large scale integrated circuits and symmetric cryptosystems, the text discusses hardware intellectual property protection, obfuscation and physically unclonable functions, Trojan threats, and algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis. Gain a comprehensive understanding of hardware security from fundamentals to practical applications.
- Bog
- 1.726,95 kr.