פרופ' אלכס פיש נושאים מתקדמים באמינות ואבטחת מערכות 83-947
![]() |
Power analysis attacks : revealing the secrets of smart cards by Stefan Mangard, Elisabeth Oswald, Thomas Popp Publisher: Springer 006.246 MAN p |
S.A. Kadir, A. Sasongko and M. Zulkifli, "Simple power analysis attack against elliptic curve cryptography processor on FPGA implementation," in Electrical Engineering and Informatics (ICEEI), 2011 International Conference on, pp. 1-4, 2011. | |
P. Kocher, J. Jaffe, B. Jun and P. Rohatgi, "Introduction to differential power analysis," Journal of Cryptographic Engineering, vol. 1, pp. 5-27, 2011. | |
![]() |
RFID and sensor networks : architectures, protocols, security, and integrations edited by Yan Zhang, Laurence T. Yang, Jiming Chen Publisher: CRC Press 681.2 RFI 2010 |
![]() |
RFID handbook : fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication Klaus Finkenzeller Publisher: Wiley-Blackwell 621.38411 FIN r3 |
Smart card handbook W. Rankl, W. Effing Publisher: Wiley C.3 RAN s2 בספרייה למתמטיקה |
|
D. Stinson, "Cryptography: theory and practice (2002)," Recherche, vol. 67, pp. 02, 2002. | |
![]() |
Foundations of cryptography Oded Goldreich Cambridge : Cambridge University Press, 2006 005.82 GOL f |
C. Hazay and L. Yehuda, "Efficient Secure Two-Party Protocols — Techniques and Constructions". Springer-Verlag, 2010. | |
M.G. Karpovsky, K. Kulikowski, Z, Wang, ''Robust Error Detection in Communication and Computation Channels,'' Keynote paper in the Int. Workshop on Spectral Techniques}, 2007. | |
M.G. Karpovsky and Z. Wang, "Design of Strongly Secure Communication and Computation Channels by Nonlinear Error Detecting Codes", 2011, | |
![]() |
Efficient secure two-party protocols : techniques and constructions Carmit Hazay, Yehuda Lindell Berlin : Springer, c2010.. 005.8 HAZ e |
תאריך עדכון אחרון : 16/05/2017