|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-49445-6 |
003 |
DE-He213 |
005 |
20220115084506.0 |
007 |
cr nn 008mamaa |
008 |
161117s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319494456
|9 978-3-319-49445-6
|
024 |
7 |
|
|a 10.1007/978-3-319-49445-6
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security, Privacy, and Applied Cryptography Engineering
|h [electronic resource] :
|b 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings /
|c edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XXIII, 420 p. 139 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 10076
|
505 |
0 |
|
|a Deep learning and Fault Based Attacks -- Leakage, Power and Fault Analysis -- Applied cryptography -- Iterative ciphers -- Hardware security -- Security -- Post-quantum cryptology.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, held in Hyderabad, India, in December 2016. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Data protection-Law and legislation.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Software engineering.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Privacy.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Software Engineering.
|
700 |
1 |
|
|a Carlet, Claude.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Hasan, M. Anwar.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Saraswat, Vishal.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319494449
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319494463
|
830 |
|
0 |
|a Security and Cryptology ;
|v 10076
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-49445-6
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|