000 | 03145nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-642-33027-8 | ||
003 | DE-He213 | ||
005 | 20160624102217.0 | ||
007 | cr nn 008mamaa | ||
008 | 120905s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642330278 _9978-3-642-33027-8 |
||
024 | 7 |
_a10.1007/978-3-642-33027-8 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
245 | 1 | 0 |
_aCryptographic Hardware and Embedded Systems – CHES 2012 _h[electronic resource] : _b14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings / _cedited by Emmanuel Prouff, Patrick Schaumont. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXVII, 562 p. 189 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7428 |
|
505 | 0 | _aIntrusive Attacks and Countermeasures -- Masking -- Improved Fault Attacks and Side Channel Analysis -- Leakage Resiliency and Security Analysis -- Physically Unclonable Functions -- Efficient Implementations -- Lightweight Cryptography -- We Still Love RSA -- Hardware Implementations. | |
520 | _aThis book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aData protection. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aComputer software. | |
650 | 0 | _aComputational complexity. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aDiscrete Mathematics in Computer Science. |
700 | 1 |
_aProuff, Emmanuel. _eeditor. |
|
700 | 1 |
_aSchaumont, Patrick. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642330261 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7428 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-33027-8 |
942 |
_2EBK10442 _cEBK |
||
999 |
_c39736 _d39736 |