menu
{ "item_title" : "Smart Card Research and Advanced Applications", "item_author" : [" Stefan Mangard "], "item_description" : "Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection.- Dynamic Fault Injection Countermeasure: A New Conception of Java Card Security.- Java Card Combined Attacks with Localization-Agnostic Fault.- Improved (and Practical) Public-Key Authentication for UHF RFID. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards.- On the Use of Shamir's Secret Sharing against Side-Channel Analysis.- Secure Multiple SBoxes Implementation with Arithmetically Masked Input.- Low-Cost Countermeasure against RPA.- Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models.- On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices.- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.- Putting together What Fits together - Gr Stl.- Memory Access Pattern Protection for Resource-Constrained Devices.- Multipurpose Cryptographic Primitive ARMADILLO3.- Improving Side-Channel Analysis with Optimal Linear Transforms.- SCA with Magnitude Squared Coherence.- Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis.- Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines.- Defensive Leakage Camouflage.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/3/64/237/287/3642372872_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Smart Card Research and Advanced Applications|Stefan Mangard

Smart Card Research and Advanced Applications : 11th International Conference, Cardis 2012, Graz, Austria, November 28-30, 2012, Revised Selected Paper

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection.- Dynamic Fault Injection Countermeasure: A New Conception of Java Card Security.- Java Card Combined Attacks with Localization-Agnostic Fault.- Improved (and Practical) Public-Key Authentication for UHF RFID. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards.- On the Use of Shamir's Secret Sharing against Side-Channel Analysis.- Secure Multiple SBoxes Implementation with Arithmetically Masked Input.- Low-Cost Countermeasure against RPA.- Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models.- On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices.- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.- Putting together What Fits together - Gr Stl.- Memory Access Pattern Protection for Resource-Constrained Devices.- Multipurpose Cryptographic Primitive ARMADILLO3.- Improving Side-Channel Analysis with Optimal Linear Transforms.- SCA with Magnitude Squared Coherence.- Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis.- Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines.- Defensive Leakage Camouflage.

This item is Non-Returnable

Details

  • ISBN-13: 9783642372872
  • ISBN-10: 3642372872
  • Publisher: Springer
  • Publish Date: March 2013
  • Dimensions: 9.21 x 6.14 x 0.65 inches
  • Shipping Weight: 0.97 pounds
  • Page Count: 297

Related Categories

You May Also Like...

    1

BAM Customer Reviews