Cryptographic Hardware and Embedded Systems -- CHES 2013: 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings

Author:   Guido Marco Bertoni ,  Jean-Sébastien Coron
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2013 ed.
Volume:   8086
ISBN:  

9783642403484


Pages:   490
Publication Date:   30 July 2013
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $155.22 Quantity:  
Add to Cart

Share |

Cryptographic Hardware and Embedded Systems -- CHES 2013: 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings


Add your own review!

Overview

This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.

Full Product Details

Author:   Guido Marco Bertoni ,  Jean-Sébastien Coron
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2013 ed.
Volume:   8086
Dimensions:   Width: 15.50cm , Height: 2.60cm , Length: 23.50cm
Weight:   0.765kg
ISBN:  

9783642403484


ISBN 10:   3642403484
Pages:   490
Publication Date:   30 July 2013
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Side-channel attacks.- Physical unclonable function.- Lightweight cryptography.- Hardware implementations and fault attacks.- Efficient and secure implementations.- Elliptic curve cryptography.- masking.- Side-channel attacks and countermeasures.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List