Linked e-resources
Details
Table of Contents
Cryptographic Engineering
Design of Cryptographic Primitive
Random Number Generators and PUFs
Cryptographic Hardware Cryptographic Software
Cryptographic Protocols
Formal Methods in Cryptographic Engineering
Evaluation of Cryptosystems
Attacks and Countermeasures
Side-channel Analysis and Countermeasures
Fault Analysis and Countermeasures
Reverse Engineering and Tampering
Hardware Trojans and Counterfeit Detection
Cryptanalysis
Security and Privacy
Secure Networking Protocols
Authentication and Authorization Botnets
Anonymity Intrusion Detection
Operating Systems Security
Trustworthy Computing
Malware and Malware Detection
Testing for Secure.
Design of Cryptographic Primitive
Random Number Generators and PUFs
Cryptographic Hardware Cryptographic Software
Cryptographic Protocols
Formal Methods in Cryptographic Engineering
Evaluation of Cryptosystems
Attacks and Countermeasures
Side-channel Analysis and Countermeasures
Fault Analysis and Countermeasures
Reverse Engineering and Tampering
Hardware Trojans and Counterfeit Detection
Cryptanalysis
Security and Privacy
Secure Networking Protocols
Authentication and Authorization Botnets
Anonymity Intrusion Detection
Operating Systems Security
Trustworthy Computing
Malware and Malware Detection
Testing for Secure.