Atjaunināt sīkdatņu piekrišanu

Cryptographic Hardware and Embedded Systems CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings 1st ed. 2017 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 710 pages, height x width: 235x155 mm, 210 Illustrations, black and white; XIV, 710 p. 210 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 10529
  • Izdošanas datums: 25-Aug-2017
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319667866
  • ISBN-13: 9783319667867
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 710 pages, height x width: 235x155 mm, 210 Illustrations, black and white; XIV, 710 p. 210 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 10529
  • Izdošanas datums: 25-Aug-2017
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319667866
  • ISBN-13: 9783319667867
Citas grāmatas par šo tēmu:
This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017.
The 33 full papers presented in this volume were carefully reviewed and selected from 130 submissions.

The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.
Side Channel Analysis.- Higher Order Countermeasures.- Emerging Attacks.- Post Quantum Implementations.- Cipher and Protocol Design.- Security Evaluation.- FPGA Security.- Encoding Techniques.- Efficient Implementations.-