Discusses the latest fault attacks on a wide variety of cryptographic implementations, such as biased fault attacks, algebraic fault attacks, and attacks on authenticated encryption based ciphers
Offers hands-on and practical demonstrations for handling complex secure cryptographic architectures, complementing the theoretical analysis
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.








