Normal view MARC view ISBD view

Lightweight Cryptography for Security and Privacy [electronic resource] : 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers / edited by Tim G�uneysu, Gregor Leander, Amir Moradi.

Contributor(s): G�uneysu, Tim [editor.] | Leander, Gregor [editor.] | Moradi, Amir [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 9542Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Edition: 1st ed. 2016.Description: IX, 165 p. 44 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319290782.Subject(s): Computer science | Computer communication systems | Computer security | Data encryption (Computer science) | Algorithms | Computer Science | Data Encryption | Systems and Data Security | Computer Communication Networks | Algorithm Analysis and Problem ComplexityAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed post-conference proceedings of the 4th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2015, held in Bochum, Germany, in September 2015. The 9 full papers presented were carefully reviewed and selected from 17 submissions. The papers are organized in the following topical sections: cryptanalysis, lightweight constructions, implementation challenges. .
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed post-conference proceedings of the 4th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2015, held in Bochum, Germany, in September 2015. The 9 full papers presented were carefully reviewed and selected from 17 submissions. The papers are organized in the following topical sections: cryptanalysis, lightweight constructions, implementation challenges. .

There are no comments for this item.

Log in to your account to post a comment.