Staff View for: Security, privacy, and applied cryptogra

 Staff view

You must be logged in to Tag Records

Security, privacy, and applied cryptography engineering : third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings /

Benedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay (eds.).

Book Cover
Names: Gierlichs, Benedikt, | Guilley, Sylvain, | Mukhopadhyay, Debdeep,
Published: Heidelberg : Springer, 2013.
Series: Lecture notes in computer science ; 8204.
LNCS sublibrary. SL 4, Security and cryptology.
Topics: Computer security - Congresses. | Computer Security.
Genres: Electronic books. | Ebook. | Conference papers and proceedings. | Congresses.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 04707cam a2200673Ii 4500
001 13799690
005 20180530220748.0
006 m o d
007 cr cnu|||unuuu
008 131002s2013 gw a o 101 0 eng d
016 7 |a016519421|2Uk
019 |a861177788|a934987836|a936312448
020 |a9783642412240|q(electronic bk.)
020 |a3642412246|q(electronic bk.)
020 |a3642412238|q(print)
020 |a9783642412233|q(print)
020 |z9783642412233
024 7 |a10.1007/978-3-642-41224-0|2doi
035 |a(OCoLC)ocn859249981
035 |a(EIUdb)1164893
040 |aGW5XE|beng|erda|epn|cGW5XE|dYDXCP|dNLGGC|dCOO|dZMC|dNAM|dOHS|dUKMGB|dOCLCO|dOCLCF|dOCLCQ|dOCLCO|dOCL|dOCLCO|dEBLCP|dOCLCO|dOCLCQ|dOCLCO|dOCLCQ|dOCLCO|dDIBIB|dOCLCO|dYDX|dJG0|dMERER|dDGU|dESU|dOCLCQ|dIOG|dOCLCO|dNJR|dOCLCA|dBUF|dOCLCO|dEIUdb
049 |aIADA
050 4|aQA76.9.A25|bI58 2013
060 4|aQA 76.9.A25
072 7|aUR|2bicssc
072 7|aUTN|2bicssc
072 7|aCOM053000|2bisacsh
082 04|a005.8|223
111 2 |aSPACE (Conference : Applied cryptography engineering)|n(3rd :|d2013 :|cKharagpur, India)
245 10|aSecurity, privacy, and applied cryptography engineering :|bthird International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings /|cBenedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay (eds.).
246 3 |aSPACE 2013
264 1|aHeidelberg :|bSpringer,|c2013.
300 |a1 online resource (xiv, 191 pages) :|billustrations.
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
347 |atext file|bPDF|2rda
490 1 |aLecture Notes in Computer Science,|x0302-9743 ;|v8204
490 1 |aLNCS sublibrary. SL 4, Security and cryptology
500 |aInternational conference proceedings.
500 |aIncludes author index.
504 |aIncludes author index.
505 00|tImplementations and Protocols.|tThree Design Dimensions of Secure Embedded Systems /|rPatrick Schaumont, Aydin Aysu --|tInvestigating the Application of One Instruction Set Computing for Encrypted Data Computation /|rNektarios Georgios Tsoutsos, Michail Maniatakos --|tAlphanumeric Shellcode Generator for ARM Architecture /|rPratik Kumar, Nagendra Chowdary, Anish Mathuria --|tSIMD-Based Implementations of Sieving in Integer-Factoring Algorithms /|rBinanda Sengupta, Abhijit Das --|tStrong Security and Privacy of RFID System for Internet of Things Infrastructure /|rManik Lal Das --|tSide Channel Attacks and Countermeasures.|tCorrelation-Immune Boolean Functions for Leakage Squeezing and Rotating S-Box Masking against Side Channel Attacks /|rClaude Carlet --|tA Time Series Approach for Profiling Attack /|rLiran Lerman, Gianluca Bontempi, Souhaib Ben Taieb, Olivier Markowitch --|tAlgorithms for Switching between Boolean and Arithmetic Masking of Second Order /|rPraveen Kumar Vadnala, Johann Großschädl --|tIdentity-Based Identification Schemes.|tIdentity-Based Identification Schemes from ID-KEMs /|rPrateek Barapatre, Chandrasekaran Pandu Rangan --|tAnonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings /|rPrateek Barapatre, Chandrasekaran Pandu Rangan --|tSignatures.|tDynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard Model /|rSyed Taqi Ali, B.B. Amberker --|tFrom Selective-ID to Full-ID IBS without Random Oracles /|rSanjit Chatterjee, Chethan Kamath.
520 |aThis book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based indentification schemes, and signatures.
588 0 |aOnline resource; title from PDF title page (SpringerLink, viewed September 16, 2013).
650 0|aComputer security|vCongresses.
650 7|aComputer security.|2fast|0(OCoLC)fst00872484
650 2|aComputer Security.
655 4|aElectronic books.
655 4|aEbook.
655 7|aConference papers and proceedings.|2fast|0(OCoLC)fst01423772
655 2|aCongresses.
700 1 |aGierlichs, Benedikt,|eeditor.
700 1 |aGuilley, Sylvain,|eeditor.
700 1 |aMukhopadhyay, Debdeep,|eeditor.
776 08|iPrinted edition:|z9783642412233
830 0|aLecture notes in computer science ;|v8204.
830 0|aLNCS sublibrary.|nSL 4,|pSecurity and cryptology.
994 |a92|bIAD

Staff View for: Security, privacy, and applied cryptogra