![9783662447086-3662447088-Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings (Security and Cryptology)](https://booksrun.com/image-loader/215/https:__m.media-amazon.com_images_I_41SMR-kUD-L._SL500_.jpg)
Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings (Security and Cryptology)
ISBN-13:
9783662447086
ISBN-10:
3662447088
Edition:
2014
Author:
Matthew Robshaw, Lejla Batina
Publication date:
2014
Publisher:
Springer
Format:
Paperback
632 pages
FREE US shipping
Book details
ISBN-13:
9783662447086
ISBN-10:
3662447088
Edition:
2014
Author:
Matthew Robshaw, Lejla Batina
Publication date:
2014
Publisher:
Springer
Format:
Paperback
632 pages
Summary
Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings (Security and Cryptology) (ISBN-13: 9783662447086 and ISBN-10: 3662447088), written by authors
Matthew Robshaw, Lejla Batina, was published by Springer in 2014.
With an overall rating of 4.5 stars, it's a notable title among other
books. You can easily purchase or rent Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings (Security and Cryptology) (Paperback) from BooksRun,
along with many other new and used
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}