|
|
|
|
LEADER |
02677nam a22005055i 4500 |
001 |
978-3-642-40349-1 |
003 |
DE-He213 |
005 |
20151030211056.0 |
007 |
cr nn 008mamaa |
008 |
130719s2013 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642403491
|9 978-3-642-40349-1
|
024 |
7 |
|
|a 10.1007/978-3-642-40349-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Cryptographic Hardware and Embedded Systems - CHES 2013
|h [electronic resource] :
|b 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings /
|c edited by Guido Bertoni, Jean-Sébastien Coron.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XIV, 490 p. 172 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8086
|
505 |
0 |
|
|a Side-channel attacks -- Physical unclonable function -- Lightweight cryptography -- Hardware implementations and fault attacks -- Efficient and secure implementations -- Elliptic curve cryptography -- masking -- Side-channel attacks and countermeasures.
|
520 |
|
|
|a This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
700 |
1 |
|
|a Bertoni, Guido.
|e editor.
|
700 |
1 |
|
|a Coron, Jean-Sébastien.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642403484
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8086
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-40349-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|