• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Debdeep Mukhopadhyay - książki

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC
 Hardware Security: Design, Threats, and Safeguards Mukhopadhyay, Debdeep 9781439895832 CRC Press
Hardware Security: Design, Threats, and Safeguards

Mukhopadhyay, Debdeep

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).

Gain a Comprehensive...

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical prin...

cena: 609,72
 Security, Privacy, and Applied Cryptography Engineering: Third International Conference, Space 2013, Kharagpur, India, October 19-23, 2013, Proceeding Gierlichs, Benedikt 9783642412233 Springer
Security, Privacy, and Applied Cryptography Engineering: Third International Conference, Space 2013, Kharagpur, India, October 19-23, 2013, Proceeding

Gierlichs, Benedikt
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in...
cena: 185,62
 Timing Channels in Cryptography: A Micro-Architectural Perspective Rebeiro, Chester 9783319123691 Springer
Timing Channels in Cryptography: A Micro-Architectural Perspective

Rebeiro, Chester
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further...
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when...
cena: 403,47
 Progress in Cryptology -- Indocrypt 2014: 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings Meier, Willi 9783319130385 Springer
Progress in Cryptology -- Indocrypt 2014: 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings

Meier, Willi
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, in December 2014. The 25 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on side channel analysis; theory; block ciphers; cryptanalysis; efficient hardware design; protected hardware design; elliptic curves.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, ...
cena: 201,72
 Fault Tolerant Architectures for Cryptography and Hardware Security Sikhar Patranabis Debdeep Mukhopadhyay 9789811013867 Springer
Fault Tolerant Architectures for Cryptography and Hardware Security

Sikhar Patranabis Debdeep Mukhopadhyay
It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods.
It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum...
cena: 564,88
 Timing Channels in Cryptography: A Micro-Architectural Perspective Rebeiro, Chester 9783319380773 Springer
Timing Channels in Cryptography: A Micro-Architectural Perspective

Rebeiro, Chester
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers.
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when...
cena: 403,47
 Fault Tolerant Architectures for Cryptography and Hardware Security Sikhar Patranabis Debdeep Mukhopadhyay 9789811338199 Springer
Fault Tolerant Architectures for Cryptography and Hardware Security

Sikhar Patranabis Debdeep Mukhopadhyay
cena: 564,88


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia