|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-13039-2 |
003 |
DE-He213 |
005 |
20220115054757.0 |
007 |
cr nn 008mamaa |
008 |
141024s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319130392
|9 978-3-319-13039-2
|
024 |
7 |
|
|a 10.1007/978-3-319-13039-2
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Progress in Cryptology -- INDOCRYPT 2014
|h [electronic resource] :
|b 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings /
|c edited by Willi Meier, Debdeep Mukhopadhyay.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XXVI, 444 p. 80 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8885
|
505 |
0 |
|
|a Side channel analysis -- Theory -- Block ciphers -- Cryptanalysis -- Efficient hardware design -- Protected hardware design -- Elliptic curves.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, in December 2014. The 25 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on side channel analysis; theory; block ciphers; cryptanalysis; efficient hardware design; protected hardware design; elliptic curves.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
|
0 |
|a Discrete mathematics.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
700 |
1 |
|
|a Meier, Willi.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Mukhopadhyay, Debdeep.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319130408
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319130385
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8885
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-13039-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|