|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-23951-9 |
003 |
DE-He213 |
005 |
20220115062350.0 |
007 |
cr nn 008mamaa |
008 |
110926s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642239519
|9 978-3-642-23951-9
|
024 |
7 |
|
|a 10.1007/978-3-642-23951-9
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Cryptographic Hardware and Embedded Systems -- CHES 2011
|h [electronic resource] :
|b 13th International Workshop, Nara, Japan, September 28 -- October 1, 2011, Proceedings /
|c edited by Bart Preneel, Tsuyoshi Takagi.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a XIV, 524 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 6917
|
520 |
|
|
|a This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
|
0 |
|a Discrete mathematics.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
700 |
1 |
|
|a Preneel, Bart.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Takagi, Tsuyoshi.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642239502
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642239526
|
830 |
|
0 |
|a Security and Cryptology ;
|v 6917
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-23951-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|