000 | 02568nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-642-29912-4 | ||
003 | DE-He213 | ||
005 | 20140220083317.0 | ||
007 | cr nn 008mamaa | ||
008 | 120419s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642299124 _9978-3-642-29912-4 |
||
024 | 7 |
_a10.1007/978-3-642-29912-4 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
100 | 1 |
_aSchindler, Werner. _eeditor. |
|
245 | 1 | 0 |
_aConstructive Side-Channel Analysis and Secure Design _h[electronic resource] : _bThird International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings / _cedited by Werner Schindler, Sorin A. Huss. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2012. |
|
300 |
_aApprox. 280 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7275 |
|
520 | _aThis book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, held in Darmstadt, Germany, May 2012. The 16 revised full papers presented together with two invited talks were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on practical side-channel analysis; secure design; side-channel attacks on RSA; fault attacks; side-channel attacks on ECC; different methods in side-channel analysis. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData protection. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer software. | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputers and Society. |
700 | 1 |
_aHuss, Sorin A. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642299117 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7275 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-29912-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
999 |
_c103106 _d103106 |