Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings / [electronic resource] :
edited by Guido Bertoni, Jean-S�ebastien Coron.
- XIV, 490 p. 172 illus. online resource.
- Lecture Notes in Computer Science, 8086 0302-9743 ; .
- Lecture Notes in Computer Science, 8086 .
Side-channel attacks -- Physical unclonable function -- Lightweight cryptography -- Hardware implementations and fault attacks -- Efficient and secure implementations -- Elliptic curve cryptography -- masking -- Side-channel attacks and countermeasures.
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.
9783642403491
10.1007/978-3-642-40349-1 doi
Computer science.
Computer security.
Data encryption (Computer science).
Algorithms.
Computer Science.
Data Encryption.
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
QA76.9.A25
005.82
Side-channel attacks -- Physical unclonable function -- Lightweight cryptography -- Hardware implementations and fault attacks -- Efficient and secure implementations -- Elliptic curve cryptography -- masking -- Side-channel attacks and countermeasures.
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.
9783642403491
10.1007/978-3-642-40349-1 doi
Computer science.
Computer security.
Data encryption (Computer science).
Algorithms.
Computer Science.
Data Encryption.
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
QA76.9.A25
005.82