Free delivery for purchases over 1 299 Kč
PPL Parcel Shop 54 Czech Post 74 Balíkovna 49 GLS point 54 GLS courier 64 Zásilkovna 44 PPL courier 99

Cryptographic Hardware and Embedded Systems -- CHES 2015

Language EnglishEnglish
Book Paperback
Book Cryptographic Hardware and Embedded Systems -- CHES 2015 Tim Güneysu
Libristo code: 09511916
This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic H... Full description
? points 147 b
1 472
Low in stock at our supplier Shipping in 10-14 days

30-day return policy


You might also be interested in


Irish Phrasebook Niall Callan / Paperback
common.buy 113
COMING SOON
Skeleton Road Val McDermid / Paperback
common.buy 258
Mathematical Analysis Tom M. Apostol / Paperback
common.buy 4 632
Digital Design with Verilog® HDL Elizer Sternheim / Paperback
common.buy 1 472
Network-on-Chip Security and Privacy Prabhat Mishra / Paperback
common.buy 2 643
SSA-based Compiler Design Fabrice Rastello / Paperback
common.buy 2 383
Riemannian Computing in Computer Vision Pavan K. Turaga / Hardback
common.buy 4 463
Wild About Twickenham Ed Harris / Hardback
common.buy 739
Politics of Religion in Indonesia Michel Picard / Paperback
common.buy 1 894
Water Maj Gen A K Chaturvedi (Retd) / Paperback
common.buy 901

This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully reviewed and selected from 128 submissions. They are organized in the following topical sections: processing techniques in side-channel analysis; cryptographic hardware implementations; homomorphic encryption in hardware; side-channel attacks on public key cryptography; cipher design and cryptanalysis; true random number generators and entropy estimations; side-channel analysis and fault injection attacks; higher-order side-channel attacks; physically unclonable functions and hardware trojans; side-channel attacks in practice; and lattice-based implementations.

Login

Log in to your account. Don't have a Libristo account? Create one now!

 
mandatory
mandatory

Don’t have an account? Discover the benefits of having a Libristo account!

With a Libristo account, you'll have everything under control.

Create a Libristo account