menu
{ "item_title" : "Security, Privacy, and Applied Cryptography Engineering", "item_author" : [" Andrey Bogdanov", "Somitra Sanadhya "], "item_description" : "A Novel Circuit Design Methodology to Reduce Side Channel Leakage.- The Schedulability of AES as a Countermeasure against Side Channel Attacks.- Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers.- Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs.- Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack.- Towards Formal Analysis of Key Control in Group Key Agreement Protocols.- Some Results on Related Key-IV Pairs of Grain.- A Differential Fault Attack on Grain-128a Using MACs.- Breaking Hitag 2 Revisited.- Reduction in Lossiness of RSA Trapdoor Permutation.- Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/3/64/234/415/3642344151_b.jpg", "price_data" : { "retail_price" : "72.00", "online_price" : "72.00", "our_price" : "72.00", "club_price" : "72.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Security, Privacy, and Applied Cryptography Engineering|Andrey Bogdanov

Security, Privacy, and Applied Cryptography Engineering : Second International Conference, Space 2012, Chennai, India, November 3-4, 2012, Proceedings

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

A Novel Circuit Design Methodology to Reduce Side Channel Leakage.- The Schedulability of AES as a Countermeasure against Side Channel Attacks.- Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers.- Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs.- Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack.- Towards Formal Analysis of Key Control in Group Key Agreement Protocols.- Some Results on Related Key-IV Pairs of Grain.- A Differential Fault Attack on Grain-128a Using MACs.- Breaking Hitag 2 Revisited.- Reduction in Lossiness of RSA Trapdoor Permutation.- Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters.

This item is Non-Returnable

Details

  • ISBN-13: 9783642344152
  • ISBN-10: 3642344151
  • Publisher: Springer
  • Publish Date: September 2012
  • Dimensions: 9 x 6.1 x 0.6 inches
  • Shipping Weight: 0.6 pounds
  • Page Count: 173

Related Categories

You May Also Like...

    1

BAM Customer Reviews