Lightweight cryptography for security and privacy: 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8162 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | X, 141 S. graph. Darst. |
ISBN: | 3642403913 9783642403910 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041261793 | ||
003 | DE-604 | ||
005 | 20210319 | ||
007 | t| | ||
008 | 130909s2013 gw d||| |||| 10||| eng d | ||
015 | |a 13,N34 |2 dnb | ||
016 | 7 | |a 1038191149 |2 DE-101 | |
020 | |a 3642403913 |9 3-642-40391-3 | ||
020 | |a 9783642403910 |c Print |9 978-3-642-40391-0 | ||
024 | 3 | |a 9783642403910 | |
028 | 5 | 2 | |a Best.-Nr.: 86301814 |
035 | |a (OCoLC)864531288 | ||
035 | |a (DE-599)DNB1038191149 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Lightweight cryptography for security and privacy |b 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers |c Gildas Avoine ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a X, 141 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8162 | |
650 | 0 | 7 | |a Blockchiffre |0 (DE-588)4323693-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Gebze |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 2 | |a Blockchiffre |0 (DE-588)4323693-5 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 5 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Avoine, Gildas |0 (DE-588)1207165204 |4 edt | |
711 | 2 | |a LightSec |n 2 |d 2013 |c Gebze |j Sonstige |0 (DE-588)1041631723 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-40392-7 |
830 | 0 | |a Lecture notes in computer science |v 8162 |w (DE-604)BV000000607 |9 8162 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4390762&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026235603&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026235603 |
Datensatz im Suchindex
_version_ | 1820875472618127360 |
---|---|
adam_text |
TABLE OF CONTENTS
EFFCIENT IMPLEMENTATIONS AND DESIGNS
A LIGHTWEIGHT ATMEGA-BASED APPLICATION-SPECIFIC INSTRUCTION-SET
PROCESSOR FOR ELLIPTIC CURVE CRYPTOGRAPHY 1
ERICH WENGER
ITUBEE: A SOFTWARE ORIENTED LIGHTWEIGHT BLOCK CIPHER 16
FERHAT KARAKOG., HUSEYIN DEMIRCI, AND A. EMRE HARMANCI
BLOCK CIPHER CRYPTANALYSIS
RELATED-KEY SLIDE ATTACKS ON BLOCK CIPHERS WITH SECRET COMPONENTS. 28
MELTEM SONMEZ TURAN
DIFFERENTIAL FAULT ATTACK ON THE PRINCE BLOCK CIPHER 43
LING SONG AND LEI HU
MULTIDIMENSIONAL MEET-IN-THE-MIDDLE ATTACKS ON REDUCED-ROUND
TWINE-128 55
OZKAN BOZTA§, FERHAT KARAKOG, AND MUSTAFA QOBAN
WIRELESS SENSOR NETWORKS
AN IMPLEMENTATION OF THE HASH-CHAIN SIGNATURE SCHEME FOR WIRELESS
SENSOR NETWORKS 68
NADIA MOURIER, REINHARD STAMPP, AND FALKO STRENZKE
AN ADAPTIVE SECURITY ARCHITECTURE FOR LOCATION PRIVACY SENSITIVE
SENSOR NETWORK APPLICATIONS 81
JIFI
KUR
AND VASHEK MATYAS
CRYPTOGRAPHIC PROTOCOLS
SECURE AND LIGHTWEIGHT DISTANCE-BOUNDING 97
IOANA BOUREANU, AIKATERINI MITROKOTSA, AND SERGE VAUDENAY
CRYPTANALYSIS AND IMPROVEMENT OF A PROVABLY SECURE RFID OWNERSHIP
TRANSFER PROTOCOL 114
DAISUKE MORIYAMA
HTTP://D-NB.INFO/1038191149
X TABLE OF CONTENTS
AN EFFICIENT AND PRIVATE RFID AUTHENTICATION PROTOCOL SUPPORTING
OWNERSHIP TRANSFER 130
SULEYMAN KARDA§, SERKAN QELIK, ATAKAN ARSLAN, AND ALBERT LEVI
AUTHOR INDEX 143 |
any_adam_object | 1 |
author2 | Avoine, Gildas |
author2_role | edt |
author2_variant | g a ga |
author_GND | (DE-588)1207165204 |
author_facet | Avoine, Gildas |
building | Verbundindex |
bvnumber | BV041261793 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)864531288 (DE-599)DNB1038191149 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041261793</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210319</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">130909s2013 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,N34</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1038191149</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642403913</subfield><subfield code="9">3-642-40391-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642403910</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-642-40391-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642403910</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86301814</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864531288</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1038191149</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Lightweight cryptography for security and privacy</subfield><subfield code="b">2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers</subfield><subfield code="c">Gildas Avoine ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 141 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8162</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Gebze</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Avoine, Gildas</subfield><subfield code="0">(DE-588)1207165204</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">LightSec</subfield><subfield code="n">2</subfield><subfield code="d">2013</subfield><subfield code="c">Gebze</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1041631723</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-40392-7</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8162</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">8162</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4390762&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026235603&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026235603</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Gebze gnd-content |
genre_facet | Konferenzschrift 2013 Gebze |
id | DE-604.BV041261793 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:16:11Z |
institution | BVB |
institution_GND | (DE-588)1041631723 |
isbn | 3642403913 9783642403910 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026235603 |
oclc_num | 864531288 |
open_access_boolean | |
owner | DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-83 DE-11 DE-91G DE-BY-TUM |
physical | X, 141 S. graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers Gildas Avoine ... (eds.) Berlin [u.a.] Springer 2013 X, 141 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 8162 Blockchiffre (DE-588)4323693-5 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Gebze gnd-content Computersicherheit (DE-588)4274324-2 s Privatsphäre (DE-588)4123980-5 s Blockchiffre (DE-588)4323693-5 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s DE-604 Avoine, Gildas (DE-588)1207165204 edt LightSec 2 2013 Gebze Sonstige (DE-588)1041631723 oth Erscheint auch als Online-Ausgabe 978-3-642-40392-7 Lecture notes in computer science 8162 (DE-604)BV000000607 8162 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4390762&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026235603&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers Lecture notes in computer science Blockchiffre (DE-588)4323693-5 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4323693-5 (DE-588)4123980-5 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers |
title_auth | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers |
title_exact_search | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers |
title_full | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers Gildas Avoine ... (eds.) |
title_fullStr | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers Gildas Avoine ... (eds.) |
title_full_unstemmed | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers Gildas Avoine ... (eds.) |
title_short | Lightweight cryptography for security and privacy |
title_sort | lightweight cryptography for security and privacy 2nd international workshop lightsec 2013 gebze turkey may 6 7 2013 revised selected papers |
title_sub | 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers |
topic | Blockchiffre (DE-588)4323693-5 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Blockchiffre Privatsphäre Kryptosystem Kryptoanalyse Computersicherheit Sicherheitsprotokoll Konferenzschrift 2013 Gebze |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4390762&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026235603&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT avoinegildas lightweightcryptographyforsecurityandprivacy2ndinternationalworkshoplightsec2013gebzeturkeymay672013revisedselectedpapers AT lightsecgebze lightweightcryptographyforsecurityandprivacy2ndinternationalworkshoplightsec2013gebzeturkeymay672013revisedselectedpapers |