Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13820)
Included in the following conference series:
Conference proceedings info: CARDIS 2022.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 15 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: physical attacks; physical countermeasures; protecting AES; evaluation methodologies; attacking NTRU; next-generation cryptography.
Similar content being viewed by others
Keywords
- authentication
- computer hardware
- computer networks
- computer security
- cryptography
- data security
- encryption
- engineering
- Field Programmable Gate Array (FPGA)
- internet
- mathematics
- microprocessor chips
- network protocols
- network security
- probability
- side channel attack
- side-channel
- signal processing
- smart cards
- telecommunication systems
Table of contents (15 papers)
-
Physical Countermeasures
-
Attacking NTRU
Other volumes
-
Smart Card Research and Advanced Applications
Editors and Affiliations
Bibliographic Information
Book Title: Smart Card Research and Advanced Applications
Book Subtitle: 21st International Conference, CARDIS 2022, Birmingham, UK, November 7–9, 2022, Revised Selected Papers
Editors: Ileana Buhan, Tobias Schneider
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-25319-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
Softcover ISBN: 978-3-031-25318-8Published: 29 January 2023
eBook ISBN: 978-3-031-25319-5Published: 28 January 2023
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 309
Number of Illustrations: 78 b/w illustrations, 92 illustrations in colour
Topics: Cryptology, Computer Communication Networks, Computer System Implementation, Coding and Information Theory, Mobile and Network Security, Mathematics of Computing