|
|
|
|
LEADER |
02691nam a22005655i 4500 |
001 |
978-3-319-69453-5 |
003 |
DE-He213 |
005 |
20171020040924.0 |
007 |
cr nn 008mamaa |
008 |
171020s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319694535
|9 978-3-319-69453-5
|
024 |
7 |
|
|a 10.1007/978-3-319-69453-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Selected Areas in Cryptography – SAC 2016
|h [electronic resource] :
|b 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers /
|c edited by Roberto Avanzi, Howard Heys.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XIII, 580 p. 90 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10532
|
520 |
|
|
|a This book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John's, NL, Canada in August 2016. The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions. They are organized in the following topical sections: side channels and fault attacks; design and implementation of symmetric cryptography; efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Microprogramming.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Architecture, Computer.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Numerical analysis.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Control Structures and Microprogramming.
|
650 |
2 |
4 |
|a Computer System Implementation.
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|
650 |
2 |
4 |
|a Numeric Computing.
|
700 |
1 |
|
|a Avanzi, Roberto.
|e editor.
|
700 |
1 |
|
|a Heys, Howard.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319694528
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10532
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-69453-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|