|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-662-52993-5 |
003 |
DE-He213 |
005 |
20220115074918.0 |
007 |
cr nn 008mamaa |
008 |
160726s2016 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662529935
|9 978-3-662-52993-5
|
024 |
7 |
|
|a 10.1007/978-3-662-52993-5
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Fast Software Encryption
|h [electronic resource] :
|b 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers /
|c edited by Thomas Peyrin.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XI, 592 p. 105 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9783
|
505 |
0 |
|
|a Operating modes -- Stream-cipher cryptanalysis -- Components -- Side-channels and implementations -- Automated tools for cryptanalysis -- Designs -- Block-cipher cryptanalysis -- Foundations and theory -- Authenticated-encryption and hash function cryptanalysis.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
|
0 |
|a Discrete mathematics.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
700 |
1 |
|
|a Peyrin, Thomas.
|e editor.
|0 (orcid)0000-0002-2690-9197
|1 https://orcid.org/0000-0002-2690-9197
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662529928
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662529942
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9783
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-662-52993-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|