Spedizione gratuita con Packeta per un prezzo superiore a 79.99 €
BRT 7.99 Punto BRT 7.99 DHL 7.99 HR Parcel 7.49 GLS 3.99

Cryptographic Hardware and Embedded Systems -- CHES 2015

Lingua IngleseInglese
Libro In brossura
Libro Cryptographic Hardware and Embedded Systems -- CHES 2015 Tim Güneysu
Codice Libristo: 09511916
This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic H... Descrizione completa
? points 172 b
72.67
Magazzino esterno in piccole quantità Inviamo tra 13-16 giorni

30 giorni per il reso


Potrebbe interessarti anche


Irish Phrasebook Niall Callan / In brossura
common.buy 5.56
IN PREPARAZIONE
Skeleton Road Val McDermid / In brossura
common.buy 13.26
Mathematical Analysis Tom M. Apostol / In brossura
common.buy 209.15
Digital Design with Verilog® HDL Elizer Sternheim / In brossura
common.buy 72.67
Network-on-Chip Security and Privacy Prabhat Mishra / In brossura
common.buy 130.48
Wild About Twickenham Ed Harris / Rigido
common.buy 33.28
Politics of Religion in Indonesia Michel Picard / In brossura
common.buy 93.44
Water Maj Gen A K Chaturvedi (Retd) / In brossura
common.buy 44.84
SSA-based Compiler Design Fabrice Rastello / In brossura
common.buy 117.63
Riemannian Computing in Computer Vision Pavan K. Turaga / Rigido
common.buy 220.39

This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully reviewed and selected from 128 submissions. They are organized in the following topical sections: processing techniques in side-channel analysis; cryptographic hardware implementations; homomorphic encryption in hardware; side-channel attacks on public key cryptography; cipher design and cryptanalysis; true random number generators and entropy estimations; side-channel analysis and fault injection attacks; higher-order side-channel attacks; physically unclonable functions and hardware trojans; side-channel attacks in practice; and lattice-based implementations.

Regala questo libro oggi stesso
È facile
1 Aggiungi il libro al carrello e scegli la consegna come regalo 2 Ti invieremo subito il buono 3 Il libro arriverà all'indirizzo del destinatario

Accesso

Accedi al tuo account. Non hai ancora un account Libristo? Crealo ora!

 
obbligatorio
obbligatorio

Non hai un account? Ottieni i vantaggi di un account Libristo!

Con un account Libristo, avrai tutto sotto controllo.

Crea un account Libristo