Cryptographic Hardware and Embedded Systems -- CHES 2012: 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings

Author:   Emmanuel Prouff ,  Patrick R. Schaumont
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2012 ed.
Volume:   7428
ISBN:  

9783642330261


Pages:   562
Publication Date:   07 August 2012
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Cryptographic Hardware and Embedded Systems -- CHES 2012: 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings


Add your own review!

Overview

This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.

Full Product Details

Author:   Emmanuel Prouff ,  Patrick R. Schaumont
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2012 ed.
Volume:   7428
Dimensions:   Width: 15.50cm , Height: 3.00cm , Length: 23.50cm
Weight:   0.884kg
ISBN:  

9783642330261


ISBN 10:   3642330266
Pages:   562
Publication Date:   07 August 2012
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Intrusive Attacks and Countermeasures.- Masking.- Improved Fault Attacks and Side Channel Analysis.- Leakage Resiliency and Security Analysis.- Physically Unclonable Functions.- Efficient Implementations.- Lightweight Cryptography.- We Still Love RSA.- Hardware Implementations.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List