menu
{ "item_title" : "Smart Card Research and Advanced Applications", "item_author" : [" Begül Bilgin", "Jean-Bernard Fischer "], "item_description" : "Convolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations.- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES.- Improving Side-channel Analysis through Semi-supervised Learning.- Non-profiled Mask Recovery: the impact of Independent Component Analysis.- How (not) to Use Welch's T-test in Side-Channel Security Evaluations.- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys.- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M.- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication.- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs.- Electromagnetic Activity vs. Logical Activity: Near Field Scans for Reverse Engineering.- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P.- Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices.- Exploiting JCVM on smart cards using forged references in the API calls.", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/3/03/015/461/3030154610_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Smart Card Research and Advanced Applications|Begül Bilgin

Smart Card Research and Advanced Applications : 17th International Conference, Cardis 2018, Montpellier, France, November 12-14, 2018, Revised Selected

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Convolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations.- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES.- Improving Side-channel Analysis through Semi-supervised Learning.- Non-profiled Mask Recovery: the impact of Independent Component Analysis.- How (not) to Use Welch's T-test in Side-Channel Security Evaluations.- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys.- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M.- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication.- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs.- Electromagnetic Activity vs. Logical Activity: Near Field Scans for Reverse Engineering.- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P.- Breaking all the Things - A Systematic Survey of Firmware Extraction Techniques for IoT Devices.- Exploiting JCVM on smart cards using forged references in the API calls.

This item is Non-Returnable

Details

  • ISBN-13: 9783030154615
  • ISBN-10: 3030154610
  • Publisher: Springer
  • Publish Date: March 2019
  • Dimensions: 9.21 x 6.14 x 0.45 inches
  • Shipping Weight: 0.67 pounds
  • Page Count: 201

Related Categories

You May Also Like...

    1

BAM Customer Reviews