Vi bøger
Levering: 1 - 2 hverdage
Forlænget returret til d. 31. januar 2025

Bøger af Debdeep Mukhopadhyay

Filter
Filter
Sorter efterSorter Populære
  • af Debdeep Mukhopadhyay, Marc Joye & Michael Tunstall
    724,95 kr.

    This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were carefully reviewed and selected from 112 sumbissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols; cryptanalysis/side channel attacks; and cipher primitives.

  • - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings
    af Benedikt Gierlichs
    527,95 kr.

    This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.

  • af Debdeep Mukhopadhyay & SIKHAR PATRANABIS
    1.624,95 kr.

    It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods.

  • - A Micro-Architectural Perspective
    af Chester Rebeiro, Debdeep Mukhopadhyay & Sarani Bhattacharya
    1.259,95 - 1.327,95 kr.

    This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.