Cryptographic Hardware and Embedded Systems -- CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings / [electronic resource] :
edited by Guido Marco Bertoni, Jean-Sébastien Coron.
- 1st ed. 2013.
- XIV, 490 p. 172 illus. online resource.
- Security and Cryptology, 8086 2946-1863 ; .
- Security and Cryptology, 8086 .
Side-channel attacks -- Physical unclonable function -- Lightweight cryptography -- Hardware implementations and fault attacks -- Efficient and secure implementations -- Elliptic curve cryptography -- masking -- Side-channel attacks and countermeasures.
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.
9783642403491
10.1007/978-3-642-40349-1 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Algorithms.
Cryptology.
Data and Information Security.
Algorithms.
QA268
005.824
Side-channel attacks -- Physical unclonable function -- Lightweight cryptography -- Hardware implementations and fault attacks -- Efficient and secure implementations -- Elliptic curve cryptography -- masking -- Side-channel attacks and countermeasures.
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.
9783642403491
10.1007/978-3-642-40349-1 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Algorithms.
Cryptology.
Data and Information Security.
Algorithms.
QA268
005.824