Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13820)
Included in the following conference series:
Conference proceedings info: CARDIS 2022.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (15 papers)
-
Physical Countermeasures
-
Attacking NTRU
Other volumes
-
Smart Card Research and Advanced Applications
Keywords
- authentication
- computer hardware
- computer networks
- computer security
- cryptography
- data security
- encryption
- engineering
- Field Programmable Gate Array (FPGA)
- internet
- mathematics
- microprocessor chips
- network protocols
- network security
- probability
- side channel attack
- side-channel
- signal processing
- smart cards
- telecommunication systems
About this book
The 15 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: physical attacks; physical countermeasures; protecting AES; evaluation methodologies; attacking NTRU; next-generation cryptography.
Editors and Affiliations
Bibliographic Information
Book Title: Smart Card Research and Advanced Applications
Book Subtitle: 21st International Conference, CARDIS 2022, Birmingham, UK, November 7–9, 2022, Revised Selected Papers
Editors: Ileana Buhan, Tobias Schneider
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-25319-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
Softcover ISBN: 978-3-031-25318-8Published: 29 January 2023
eBook ISBN: 978-3-031-25319-5Published: 28 January 2023
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 309
Number of Illustrations: 78 b/w illustrations, 92 illustrations in colour
Topics: Cryptology, Computer Communication Networks, Computer System Implementation, Coding and Information Theory, Mobile and Network Security, Mathematics of Computing