Cryptographic Hardware and Embedded Systems -- CHES 2015

17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings

Nonfiction, Computers, Networking & Communications, Hardware, Computer Security, General Computing
Cover of the book Cryptographic Hardware and Embedded Systems -- CHES 2015 by , Springer Berlin Heidelberg
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783662483244
Publisher: Springer Berlin Heidelberg Publication: August 31, 2015
Imprint: Springer Language: English
Author:
ISBN: 9783662483244
Publisher: Springer Berlin Heidelberg
Publication: August 31, 2015
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully reviewed and selected from 128 submissions. They are organized in the following topical sections: processing techniques in side-channel analysis; cryptographic hardware implementations; homomorphic encryption in hardware; side-channel attacks on public key cryptography; cipher design and cryptanalysis; true random number generators and entropy estimations; side-channel analysis and fault injection attacks; higher-order side-channel attacks; physically unclonable functions and hardware trojans; side-channel attacks in practice; and lattice-based implementations.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully reviewed and selected from 128 submissions. They are organized in the following topical sections: processing techniques in side-channel analysis; cryptographic hardware implementations; homomorphic encryption in hardware; side-channel attacks on public key cryptography; cipher design and cryptanalysis; true random number generators and entropy estimations; side-channel analysis and fault injection attacks; higher-order side-channel attacks; physically unclonable functions and hardware trojans; side-channel attacks in practice; and lattice-based implementations.

More books from Springer Berlin Heidelberg

Cover of the book High-Risk Breast Cancer by
Cover of the book Der Untergang von Mathemagika by
Cover of the book Metal-Organic Frameworks for Photonics Applications by
Cover of the book Kinder- und Jugendpsychiatrie für Gesundheitsberufe, Erzieher und Pädagogen by
Cover of the book Politische Machtspiele - Schlachtfeld oder Chance by
Cover of the book Zintl Phases by
Cover of the book Cyclic β-Glucans from Microorganisms by
Cover of the book Mechanical Stress, Functional Adaptation and the Variation Structure of the Human Femur Diaphysis by
Cover of the book The Human Female Reproductive Tract by
Cover of the book Random Regret-based Discrete Choice Modeling by
Cover of the book Transplantation in Hematology and Oncology II by
Cover of the book Imaging of Bone and Soft Tissue Tumors by
Cover of the book Progress in High-Efficient Solution Process Organic Photovoltaic Devices by
Cover of the book Regional Development Reconsidered by
Cover of the book Tissue Engineering III: Cell - Surface Interactions for Tissue Culture by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy