פרופ' אלכס פיש נושאים מתקדמים באמינות ואבטחת מערכות 83-947

Power analysis attacks Power analysis attacks : revealing the secrets of smart cards
by Stefan Mangard, Elisabeth Oswald, Thomas Popp
Publisher: Springer
006.246 MAN p
  S.A. Kadir, A. Sasongko and M. Zulkifli, "Simple power analysis attack against elliptic curve cryptography processor on FPGA implementation," in Electrical Engineering and Informatics (ICEEI), 2011 International Conference on, pp. 1-4, 2011.
  P. Kocher, J. Jaffe, B. Jun and P. Rohatgi, "Introduction to differential power analysis," Journal of Cryptographic Engineering, vol. 1, pp. 5-27, 2011. 
RFID and sensor networks RFID and sensor networks : architectures, protocols, security, and integrations
edited by Yan Zhang, Laurence T. Yang, Jiming Chen
Publisher: CRC Press
681.2 RFI 2010
RFID handbook RFID handbook : fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication
Klaus Finkenzeller
Publisher: Wiley-Blackwell
621.38411 FIN r3
  Smart card handbook
W. Rankl, W. Effing 
Publisher: Wiley
C.3 RAN s2   בספרייה למתמטיקה
  D. Stinson, "Cryptography: theory and practice (2002)," Recherche, vol. 67, pp. 02, 2002. 
Foundations of cryptography
Oded Goldreich
Cambridge : Cambridge University Press, 2006
005.82 GOL f
  C. Hazay and L. Yehuda, "Efficient Secure Two-Party Protocols — Techniques and Constructions". Springer-Verlag, 2010.
  M.G. Karpovsky, K. Kulikowski, Z, Wang, ''Robust Error Detection in Communication and Computation Channels,''   Keynote paper in the Int. Workshop on Spectral Techniques}, 2007.
  M.G. Karpovsky and Z. Wang, "Design of Strongly Secure Communication and Computation Channels by Nonlinear Error Detecting Codes",  2011, 
Efficient secure two-party protocols : techniques and constructions
Carmit Hazay, Yehuda Lindell
Berlin : Springer, c2010..
005.8 HAZ e

תאריך עדכון אחרון : 16/05/2017