Cryptographic hardware and embedded systems-- CHES 2013 : 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings / Guido Bertoni, Jean-Sébastien Coron (eds.).Material type: TextSeries: Serienbezeichnung | Lecture notes in computer science ; 8086. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2013. Description: 1 online resource (xiii, 490 pages) : illustrations (black and white)Content type: text Media type: computer Carrier type: online resourceISBN: 9783642403491; 3642403492Other title: CHES 2013Subject(s): Data encryption (Computer science) -- Congresses | Embedded computer systems -- Congresses | Computer networks -- Security measures -- Congresses | Computer security -- Congresses | Computer Communication Networks | Computer Security | Computer networks -- Security measures | Computer security | Data encryption (Computer science) | Embedded computer systems | Computer science | Data protection | Data encryption (Computer science) | Computer software | Systems and Data Security | Algorithm Analysis and Problem ComplexityGenre/Form: Electronic books. | Congress. | Electronic books. | Ebook. | Conference papers and proceedings. Additional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: TK7895.E42 | C454 2013NLM classification: TK 7895.E42Online resources: Click here to access online
|Item type||Current library||Collection||Call number||Status||Date due||Barcode||Item holds|
International conference proceedings.
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed July 31, 2013).
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.
Print version record.
Side-channel attacks -- Physical unclonable function -- Lightweight cryptography -- Hardware implementations and fault attacks -- Efficient and secure implementations -- Elliptic curve cryptography -- masking -- Side-channel attacks and countermeasures.