|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-662-43933-3 |
003 |
DE-He213 |
005 |
20220115070035.0 |
007 |
cr nn 008mamaa |
008 |
140707s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662439333
|9 978-3-662-43933-3
|
024 |
7 |
|
|a 10.1007/978-3-662-43933-3
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Fast Software Encryption
|h [electronic resource] :
|b 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers /
|c edited by Shiho Moriai.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XIII, 605 p. 135 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8424
|
505 |
0 |
|
|a Block Ciphers -- Lightweight Block Ciphers -- Tweakable Block Ciphers -- Stream Ciphers -- Hash Functions -- Message Authentication Codes -- Provable Security -- Implementation Aspects -- Lightweight Authenticated Encryption -- Boolean Functions.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013. The 30 revised full papers presented were carefully reviewed and selected from 97 initial submissions. The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers, stream ciphers, hash functions, message authentication codes, provable security, implementation aspects, lightweight authenticated encryption, automated cryptanalysis, Boolean functions.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
700 |
1 |
|
|a Moriai, Shiho.
|e editor.
|0 (orcid)0000-0002-6072-6183
|1 https://orcid.org/0000-0002-6072-6183
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662439340
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662439326
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8424
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-662-43933-3
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|