|
|
|
|
LEADER |
03067nam a22005775i 4500 |
001 |
978-3-642-33027-8 |
003 |
DE-He213 |
005 |
20151030111228.0 |
007 |
cr nn 008mamaa |
008 |
120905s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642330278
|9 978-3-642-33027-8
|
024 |
7 |
|
|a 10.1007/978-3-642-33027-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Cryptographic Hardware and Embedded Systems – CHES 2012
|h [electronic resource] :
|b 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings /
|c edited by Emmanuel Prouff, Patrick Schaumont.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XVII, 562 p. 189 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7428
|
505 |
0 |
|
|a Intrusive Attacks and Countermeasures -- Masking -- Improved Fault Attacks and Side Channel Analysis -- Leakage Resiliency and Security Analysis -- Physically Unclonable Functions -- Efficient Implementations -- Lightweight Cryptography -- We Still Love RSA -- Hardware Implementations.
|
520 |
|
|
|a This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computer science
|x Mathematics.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
700 |
1 |
|
|a Prouff, Emmanuel.
|e editor.
|
700 |
1 |
|
|a Schaumont, Patrick.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642330261
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7428
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-33027-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|