Cryptographic Hardware and Embedded Systems CHES 2012 : 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings
This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers a...
Enregistré dans:
Auteurs principaux : | , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Cryptographic Hardware and Embedded Systems CHES 2012 : 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings / edited by Emmanuel Prouff, Patrick Schaumont. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2012 Cham : Springer Nature |
Collection : | Security and Cryptology ; 7428 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Sujets : | |
Documents associés : | Autre format:
Cryptographic Hardware and Embedded Systems CHES 2012 Autre format: Cryptographic Hardware and Embedded Systems -- CHES 2012 |
LEADER | 03620clm a2200685 4500 | ||
---|---|---|---|
001 | PPN168323354 | ||
003 | http://www.sudoc.fr/168323354 | ||
005 | 20241001155100.0 | ||
010 | |a 978-3-642-33027-8 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-33027-8 |2 DOI |
035 | |a (OCoLC)818323748 | ||
035 | |a Springer978-3-642-33027-8 | ||
035 | |a Springer-11645-978-3-642-33027-8 | ||
100 | |a 20130325d2012 u u0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
105 | |a y z 100yy | ||
106 | |a s | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a Cryptographic Hardware and Embedded Systems CHES 2012 |e 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings |f edited by Emmanuel Prouff, Patrick Schaumont. | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2012 | |
225 | 0 | |a Security and Cryptology |x 2946-1863 |v 7428 | |
330 | |a This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations. | ||
359 | 1 | |a Intrusive Attacks and Countermeasures -- Masking -- Improved Fault Attacks and Side Channel Analysis -- Leakage Resiliency and Security Analysis -- Physically Unclonable Functions -- Efficient Implementations -- Lightweight Cryptography -- We Still Love RSA -- Hardware Implementations. | |
371 | 0 | |a L'accès complet à la ressource est réservé aux usagers des établissements qui en ont fait l'acquisition | |
410 | | | |t Security and Cryptology |x 2946-1863 |v 7428 | |
452 | | | |t Cryptographic Hardware and Embedded Systems CHES 2012 |y 9783642330261 | |
452 | | | |t Cryptographic Hardware and Embedded Systems -- CHES 2012 |b Texte imprimé |y 9783642330285 | |
608 | |3 PPN02886431X |a Actes de congrès |2 rameau | ||
610 | 1 | |a Computer Science | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Data Structures, Cryptology and Information Theory | |
610 | 2 | |a Systems and Data Security | |
610 | 2 | |a Algorithm Analysis and Problem Complexity | |
610 | 2 | |a Coding and Information Theory | |
610 | 2 | |a Discrete Mathematics in Computer Science | |
610 | 2 | |a Data Structures and Information Theory. | |
610 | 1 | |a Cryptology. | |
610 | 2 | |a Algorithms | |
610 | 2 | |a Data and Information Security | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 005.82 |v 23 | ||
680 | |a QA76.9.A25 | ||
700 | 1 | |3 PPN085565520 |a Prouff |b Emmanuel |f 1975-.... |4 651 | |
701 | 1 | |a Prouff |b Emmanuel |4 651 | |
701 | 1 | |a Schaumont |b Patrick R. |4 651 | |
801 | 3 | |a FR |b Abes |c 20240611 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20240603 |g AACR2 | |
856 | 4 | |5 441099901:830854223 |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-33027-8 | |
915 | |5 441099901:830854223 |b SPRING13-00480 | ||
930 | |5 441099901:830854223 |b 441099901 |j g | ||
991 | |5 441099901:830854223 |a Exemplaire créé en masse par ITEM le 30-09-2024 16:11 | ||
997 | |a NUM |b SPRING13-00480 |d NUMpivo |e EM |s d | ||
998 | |a 978312 |