000 03096nam a22006495i 4500
001 978-3-319-69453-5
003 DE-He213
005 20240730183042.0
007 cr nn 008mamaa
008 171020s2017 sz | s |||| 0|eng d
020 _a9783319694535
_9978-3-319-69453-5
024 7 _a10.1007/978-3-319-69453-5
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aSelected Areas in Cryptography - SAC 2016
_h[electronic resource] :
_b23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers /
_cedited by Roberto Avanzi, Howard Heys.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aXIII, 580 p. 90 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v10532
520 _aThis book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John's, NL, Canada in August 2016.  The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions. They are organized in the following topical sections: side channels and fault attacks; design and implementation of symmetric cryptography; efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aData protection.
_97245
650 0 _aMicroprogramming .
_932081
650 0 _aComputer systems.
_9130284
650 0 _aComputers, Special purpose.
_946653
650 0 _aNumerical analysis.
_94603
650 1 4 _aCryptology.
_931769
650 2 4 _aData and Information Security.
_931990
650 2 4 _aControl Structures and Microprogramming.
_932083
650 2 4 _aComputer System Implementation.
_938514
650 2 4 _aSpecial Purpose and Application-Based Systems.
_946654
650 2 4 _aNumerical Analysis.
_94603
700 1 _aAvanzi, Roberto.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9130285
700 1 _aHeys, Howard.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9130286
710 2 _aSpringerLink (Online service)
_9130287
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319694528
776 0 8 _iPrinted edition:
_z9783319694542
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v10532
_9130288
856 4 0 _uhttps://doi.org/10.1007/978-3-319-69453-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c91641
_d91641