|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-33027-8 |
003 |
DE-He213 |
005 |
20220115085105.0 |
007 |
cr nn 008mamaa |
008 |
120905s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642330278
|9 978-3-642-33027-8
|
024 |
7 |
|
|a 10.1007/978-3-642-33027-8
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Cryptographic Hardware and Embedded Systems -- CHES 2012
|h [electronic resource] :
|b 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings /
|c edited by Emmanuel Prouff, Patrick R. Schaumont.
|
250 |
|
|
|a 1st ed. 2012.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XVII, 562 p. 189 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 7428
|
505 |
0 |
|
|a Intrusive Attacks and Countermeasures -- Masking -- Improved Fault Attacks and Side Channel Analysis -- Leakage Resiliency and Security Analysis -- Physically Unclonable Functions -- Efficient Implementations -- Lightweight Cryptography -- We Still Love RSA -- Hardware Implementations.
|
520 |
|
|
|a This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
|
0 |
|a Discrete mathematics.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
700 |
1 |
|
|a Prouff, Emmanuel.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Schaumont, Patrick R.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642330285
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642330261
|
830 |
|
0 |
|a Security and Cryptology ;
|v 7428
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-33027-8
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|