|
|
|
|
LEADER |
02291nmm a2200421 u 4500 |
001 |
EB001959475 |
003 |
EBX01000000000000001122377 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210312 ||| eng |
020 |
|
|
|a 9783030687731
|
100 |
1 |
|
|a Bertoni, Guido Marco
|e [editor]
|
245 |
0 |
0 |
|a Constructive Side-Channel Analysis and Secure Design
|h Elektronische Ressource
|b 11th International Workshop, COSADE 2020, Lugano, Switzerland, April 1–3, 2020, Revised Selected Papers
|c edited by Guido Marco Bertoni, Francesco Regazzoni
|
250 |
|
|
|a 1st ed. 2021
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2021, 2021
|
300 |
|
|
|a X, 339 p. 116 illus., 85 illus. in color
|b online resource
|
505 |
0 |
|
|a Fault and Side Channel Attacks -- Side-Channel Analysis Methodologies -- Evaluation of Attacks and Security -- Side-Channel Attacks and Deep Learning -- Primitives and Tools for Physical Attacks Resistance -- Side-Channel Countermeasures.
|
653 |
|
|
|a Mobile and Network Security
|
653 |
|
|
|a Computer networks / Security measures
|
653 |
|
|
|a Software engineering
|
653 |
|
|
|a Security Services
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Software Engineering
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Computer Engineering and Networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Computer engineering
|
653 |
|
|
|a Data and Information Security
|
700 |
1 |
|
|a Regazzoni, Francesco
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-030-68773-1
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-68773-1?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, held in Lugano, Switzerland, in April 2020. Due to COVID-19, the workshop was held online. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. The workshop covers subjects from wide ranges such as secure design, side channel attacks and countermeasures, and architectures and protocols
|