Feedback

X
Side Channel Attacks

Side Channel Attacks

en

0 Ungluers have Faved this Work
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 268 times via unglue.it ebook links.
  1. 13 - pdf (CC BY-NC-ND) at Unglue.it.

Keywords

  • ad lib
  • ad libraries
  • ad networks
  • AES
  • android package (APK)
  • binary Huff curve
  • cache attack
  • cache misses
  • cache side-channel attack
  • CDT sampling
  • challenge-response authentication
  • chaos theory
  • chaotic circuit
  • Cloud computing
  • constant-time cryptographic algorithm
  • countermeasure
  • CPLD
  • cryptographic keys
  • data loss
  • data outsourcing
  • elliptic curve cryptography
  • embedded system security
  • financial IC card
  • first-order analysis
  • FPGA
  • Gaussian sampling
  • Graph
  • graph similarity
  • hardware security
  • History of engineering & technology
  • horizontal collision correlation analysis
  • information leakage
  • integrity
  • key bit-dependent attack
  • lattice-based cryptography
  • leakage model
  • machine-learning classification
  • Merkle (hash) tree
  • mobile ads
  • modular exponentiation
  • n/a
  • NTRU
  • online authentication
  • physically unclonable function
  • post quantum cryptography
  • post-quantum cryptography
  • power-analysis attack
  • provable security
  • re-keying
  • recovery of secret exponent by triangular trace analysis
  • Reliability
  • rsa cryptosystem
  • scatter-gather implementation
  • second-order analysis
  • side channel analysis
  • side channel attack
  • side-channel analysis
  • side-channel attack
  • side-channel attacks
  • side-channel authentication
  • side-channel cache attacks
  • single trace analysis
  • single-trace attack
  • software development kit (SDK)
  • software development kit (SDK), android package (APK), ad lib
  • Technology, engineering, agriculture
  • Technology: general issues
  • tweakable block cipher
  • unified point addition

Links

DOI: 10.3390/books978-3-03921-001-5

Editions

edition cover
edition cover

Share

Copy/paste this into your site: