Listing 1 - 10 of 131 | << page >> |
Sort by
|
Choose an application
As information processing moves at a fast pace to small portable embedded devices, the information channels and endpoints need greater protection. Secure Integrated Circuits and Systems provides the integrated circuits designer and embedded system designer with insights into the basics of security and cryptography needed for such devices from an implementation perspective. The editor provides basic coverage of the mathematics of cryptography, basic security attack strategies, the architecture and implementation options of many security primitives and modules, and design methods for security. Applications covered include security for RFID and sensor nodes, security for FPGAs, smart-cards and flash memories. Secure Integrated Circuits and Systems is a valuable resource for those working on integrated circuits as well as for the embedded systems designer who designs for ASICs, FPGAs and small embedded processors.
Computer security. --- Integrated circuits -- Design and construction. --- Systems on a chip. --- Integrated circuits --- Computer security --- Systems on a chip --- Electrical & Computer Engineering --- Electrical Engineering --- Engineering & Applied Sciences --- Design and construction --- Integrated circuits. --- Protection. --- Chips (Electronics) --- Circuits, Integrated --- Computer chips --- Microchips --- Diffusion (Physique nucléaire) --- Propriétés optiques --- 678.07 --- -Scattering (Physics) --- Classification according to special characteristics --- 678.07 Classification according to special characteristics --- Diffusion (Physique nucléaire) --- Propriétés optiques --- Computer science. --- Special purpose computers. --- Electronic circuits. --- Computer Science. --- Special Purpose and Application-Based Systems. --- Circuits and Systems. --- Systems and Data Security. --- Polymers --- Scattering (Physics) --- Atomic scattering --- Atoms --- Nuclear scattering --- Particles (Nuclear physics) --- Scattering of particles --- Wave scattering --- Collisions (Nuclear physics) --- Particles --- Collisions (Physics) --- Polymere --- Polymeride --- Polymers and polymerization --- Macromolecules --- Optical properties --- Structure --- Scattering --- fysicochemie --- Electronic circuits --- Microelectronics --- Scattering (Physics). --- Optical properties. --- Structure. --- Polymères --- Software engineering. --- Systems engineering. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Computer software engineering --- Protection --- Security measures --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Special purpose computers --- Polymers - Structure --- Polymers - Optical properties
Choose an application
As information processing moves at a fast pace to small portable embedded devices, the information channels and endpoints need greater protection. Secure Integrated Circuits and Systems provides the integrated circuits designer and embedded system designer with insights into the basics of security and cryptography needed for such devices from an implementation perspective. The editor provides basic coverage of the mathematics of cryptography, basic security attack strategies, the architecture and implementation options of many security primitives and modules, and design methods for security. Applications covered include security for RFID and sensor nodes, security for FPGAs, smart-cards and flash memories. Secure Integrated Circuits and Systems is a valuable resource for those working on integrated circuits as well as for the embedded systems designer who designs for ASICs, FPGAs and small embedded processors.
Electrical engineering --- Computer architecture. Operating systems --- Computer. Automation --- informatica --- hardware --- computerbeveiliging --- elektrische circuits --- Computer security --- Integrated circuits --- Systems on a chip --- 681.3*B7 --- 681.3*B7 Integrated circuits (Hardware) --- Integrated circuits (Hardware) --- SOC design --- Systems on chip --- Embedded computer systems --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Design and construction --- Protection --- Security measures --- Polymers - Structure --- Polymers - Optical properties --- Scattering (Physics) --- Polymers --- Scattering (Physics). --- Optical properties. --- Structure. --- 678.07 --- 678.07 Classification according to special characteristics --- Classification according to special characteristics --- Atomic scattering --- Atoms --- Nuclear scattering --- Particles (Nuclear physics) --- Scattering of particles --- Wave scattering --- Collisions (Nuclear physics) --- Particles --- Collisions (Physics) --- Polymere --- Polymeride --- Polymers and polymerization --- Macromolecules --- Optical properties --- Structure --- Scattering --- fysicochemie --- POLYMERS --- POLYMER MORPHOLOGY --- FERROELECTRIC MATERIALS --- LIQUID CRYSTALS --- IODINE COMPOUNDS --- ETHENOL, POLYMERS --- PROPERTIES
Choose an application
Choose an application
As information processing moves at a fast pace to small portable embedded devices, the information channels and endpoints need greater protection. Secure Integrated Circuits and Systems provides the integrated circuits designer and embedded system designer with insights into the basics of security and cryptography needed for such devices from an implementation perspective. The editor provides basic coverage of the mathematics of cryptography, basic security attack strategies, the architecture and implementation options of many security primitives and modules, and design methods for security. Applications covered include security for RFID and sensor nodes, security for FPGAs, smart-cards and flash memories. Secure Integrated Circuits and Systems is a valuable resource for those working on integrated circuits as well as for the embedded systems designer who designs for ASICs, FPGAs and small embedded processors.
Electrical engineering --- Computer architecture. Operating systems --- Computer. Automation --- informatica --- hardware --- computerbeveiliging --- elektrische circuits
Choose an application
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Data encryption (Computer science). --- Application software. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Appl. in Administrative Data Processing. --- e-Commerce/e-business. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Radio frequency identification systems --- Identification systems, Radio frequency --- RF/ID systems --- RFID systems --- Identification --- Radio telemetry --- Near-field communication --- Equipment and supplies --- Information systems. --- Software engineering. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Protection --- Security measures --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Distributed processing
Choose an application
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.
Electronic circuits. --- Data encryption (Computer science). --- Algebra. --- Ordered algebraic structures. --- Circuits and Systems. --- Cryptology. --- Order, Lattices, Ordered Algebraic Structures. --- Public key cryptography. --- Algebraic structures, Ordered --- Structures, Ordered algebraic --- Algebra --- Mathematics --- Mathematical analysis --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption
Choose an application
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.
Office management --- Applied marketing --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- e-business --- computers --- informatica --- bedrijfsadministratie --- informatiesystemen --- e-commerce --- software engineering --- computerbeveiliging --- computernetwerken --- computerkunde
Choose an application
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.
Algebra --- Electrical engineering --- Computer. Automation --- algebra --- informatica --- elektrische circuits
Choose an application
Wat is cryptografie? Hoe werkte de eerste geheimtaal? Zijn er codes die niemand kan ontcijferen? Wat heeft cryptografie te maken met een gsm of een computer? Hoe kun je zelf een boodschap in geheimschrift schrijven? Wat is cryptografie? Hoe werkte de eerste geheimtaal? Zijn er codes die niemand kan ontcijferen? Wat heeft cryptografie te maken met een gsm of een computer? Hoe kun je zelf een boodschap in geheimschrift schrijven? De K.U.Leuven opende haar deuren voor leergierige kinderen. Ze bestookten de proffen met honderden vragen over wetenschap, geschiedenis, psychologie en nog zoveel meer. Siska Goeminne bundelde de interessantste en leukste vragen over geheime geschriften en codes. Nanne Meulendijks zorgde voor grappige illustraties. Ontdek welke geheimtaal Caesar gebruikte om de vijand om de tuin te leiden en welke rol cryptografie speelt in ons dagelijks leven. (Bron: www.lannoo.be)
Dutch language --- cryptografie --- cryptologie --- lager onderwijs 2de graad (doelgroep) --- Academic collection --- 684.94 --- Geheimschrift --- Raadsels --- 686 ) Boekillusratie --- geheimschrift --- mens en wetenschap --- raadsels --- Geheimschrift (jeugd) --- Puzzels, quizzen --- Raadsels (jeugd) --- Schrift - Boek - Bibliotheek --- 110424.jpg --- Geheimschrift: jeugdboeken --- boekillustraties --- Boekillustratie --- het boek, boekillustratie
Choose an application
CHES2007,theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) and held in Vienna, Austria, September 10–13, 2007. The workshop - ceived 99 submissions from 24 countries, of which the Program Committee (39 members from 15 countries) selected 31 for presentation. For the ?rst time in the history of CHES, each submission was reviewed by at least four reviewers instead of three (and at least ?ve for submissions by PC members, those now being limited to two per member) and many submitted papers have received plenty of extra reviews (some papers received up to nine reviews), thus totalling the unprecedented record of 483 reviews overall. Thepaperscollectedinthisvolumerepresentcutting-edgeworldwideresearch in the rapidly evolving ?elds of crypto-hardware, fault-based and side-channel cryptanalysis, and embedded cryptography, at the crossing of academic and - dustrial research. The wide diversity of subjects appearing in these proceedings covers virtually all related areas and shows our e?orts to extend the scope of CHES more than usual. Although a relatively young workshop, CHES is now ?rmlyestablishedasascienti?ceventofreferenceappreciatedbymoreandmore renowned experts of theory and practice: many high-quality works were subm- ted, all of which, sadly, could not be accepted. Selecting from so many good worksis no easy task and our deepest thanks go to the members of the Program Committee for their involvement, excellence, and team spirit. We are grateful to the numerous external reviewers listed below for their expertise and assistance in our deliberations.
Embedded computer systems --- Cryptography --- Computer security --- Systèmes enfouis (Informatique) --- Cryptographie --- Sécurité informatique --- Congresses. --- Congrès --- Electrical Engineering --- Computer Science --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer science. --- Logic design. --- Computer communication systems. --- Special purpose computers. --- Operating systems (Computers). --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Logic Design. --- Operating Systems. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Software engineering. --- Information Systems. --- Cryptology. --- Computer software engineering --- Engineering
Listing 1 - 10 of 131 | << page >> |
Sort by
|