Related Books
Language: en
Pages: 162
Pages: 162
Type: BOOK - Published: 2014-12-12 - Publisher: Springer
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers a
Language: en
Pages: 373
Pages: 373
Type: BOOK - Published: 2004-05-17 - Publisher: Springer
This book constitutes the thoroughly refereed postproceedings of the 10th Annual International Workshop on Selected Areas in Cryptography, SAC 2003, held in Ott
Language: en
Pages: 246
Pages: 246
Type: BOOK - Published: 2009-02-01 - Publisher: Springer Science & Business Media
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next g
Language: en
Pages: 474
Pages: 474
Type: BOOK - Published: 2023-11-01 - Publisher: Springer Nature
This book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new
Language: en
Pages: 476
Pages: 476
Type: BOOK - Published: - Publisher: Springer Nature