Cryptographic hardware and embedded systems - CHES 2014: 16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Heidelberg [u.a.]
Springer
2014
|
Schriftenreihe: | Lecture notes in computer science
8731 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIV, 618 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 9783662447086 |
Internformat
MARC
LEADER | 00000nam a22000008cb4500 | ||
---|---|---|---|
001 | BV042122779 | ||
003 | DE-604 | ||
005 | 20141030 | ||
007 | t| | ||
008 | 141016s2014 gw ad|| |||| 10||| eng d | ||
015 | |a 14,N33 |2 dnb | ||
016 | 7 | |a 1054625166 |2 DE-101 | |
020 | |a 9783662447086 |c Pb. : ca. EUR 85.60 (DE) (freier Pr.), ca. EUR 88.00 (AT) (freier Pr.), ca. sfr 106.50 (freier Pr.) |9 978-3-662-44708-6 | ||
024 | 3 | |a 9783662447086 | |
028 | 5 | 2 | |a Best.-Nr.: 86379976 |
035 | |a (OCoLC)894932197 | ||
035 | |a (DE-599)DNB1054625166 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-91G |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 260f |2 stub | ||
084 | |a DAT 130f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
111 | 2 | |a CHES |n 16. |d 2014 |c Busan |j Verfasser |0 (DE-588)1059505223 |4 aut | |
245 | 1 | 0 | |a Cryptographic hardware and embedded systems - CHES 2014 |b 16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings |c Lejla Batina ... (eds.) |
264 | 1 | |a Heidelberg [u.a.] |b Springer |c 2014 | |
300 | |a XIV, 618 S. |b Ill., graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8731 | |
650 | 0 | 7 | |a Eingebettetes System |0 (DE-588)4396978-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hardwareentwurf |0 (DE-588)4159103-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2014 |z Pusan |2 gnd-content | |
689 | 0 | 0 | |a Eingebettetes System |0 (DE-588)4396978-1 |D s |
689 | 0 | 1 | |a Hardwareentwurf |0 (DE-588)4159103-3 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Batina, Lejla |e Sonstige |0 (DE-588)1060230399 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-662-44709-3 |
830 | 0 | |a Lecture notes in computer science |v 8731 |w (DE-604)BV000000607 |9 8731 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4738571&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027562984&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027562984 |
Datensatz im Suchindex
_version_ | 1820875623535476736 |
---|---|
adam_text |
TABLE OF CONTENTS
SIDE-CHANNEL ATTACKS
EM ATTACK IS NON-INVASIVE?
- DESIGN METHODOLOGY AND VALIDITY
VERIFICATION OF EM ATTACK SENSOR 1
NAOFUMI HOMMA, YU-ICHI HAYCTSHI, NORIYUKI MIURA,
DAISUKE PUJIMOTO, DAICHI TANAKA, MAKOTO NAGATA, AND
TAKAFUMI AOKI
A NEW
FRAMEWORK FOR CONSTRAINT-BASED PROBABILISTIC TEMPLATE SIDE
CHANNEL ATTACKS 17
YOSSEF OREN, OFIR WEISSE, AND AVISHAI WOOL
HOW
TO ESTIMATE THE SUCCESS RATE OF HIGHER-ORDER SIDE-CHANNEL
ATTACKS 35
VICTOR LOMNE, EMMANUEL PROUFF, MATTHIEU RIVAIN,
THOMAS ROCHE, AND ADRIAN THILLARD
GOOD IS NOT GOOD ENOUGH: DERIVING OPTIMAL DISTINGUISHERS FROM
COMMUNICATION THEORY 55
ANNELIE HEUSER, OLIVIER RIOUL, AND SYLVAIN GUILLEY
NEW ATTACKS AND CONSTRUCTIONS
"OOH AAH. JUST A LITTLE BIT" : A SMALL AMOUNT OF SIDE CHANNEL CAN
GO A LONG WAY 75
NAOMI BENGER, JOOP VAN DE POL, NIGEL P. SMART, AND YUVAL YAROM
DESTROYING FAULT INVARIANT WITH RANDOMIZATION: A COUNTERMEASURE FOR
AES AGAINST DIFFERENTIAL FAULT ATTACKS 93
HARSHAL TUPSAMUDRE, SHIKHA BISHT, AND DEBDEEP MUKHOPADHYAY
REVERSING STEALTHY DOPANT-LEVEL CIRCUITS 112
TAKESHI SUGAWARA, DAISUKE SUZUKI, RYOICHI PUJII, SHIGEAKI TAWA,
RYOHEI HORI, MITSURU SHIOZAKI, AND TAKESHI PUJINO
CONSTRUCTING S-BOXES FOR LIGHTWEIGHT CRYPTOGRAPHY WITH FEISTEL
STRUCTURE 127
YONGQIANG LI AND MINGSHENG WANG
COUNTERMEASURES
A STATISTICAL MODEL FOR HIGHER ORDER DPA ON MASKED DEVICES 147
A. ADAM DING, LIWEI ZHANG, YUNSI FEI, AND PEI LUO
HTTP://D-NB.INFO/1054625166
XII TABLE OF CONTENTS
FAST EVALUATION OF POLYNOMIALS OVER BINARY FINITE FIELDS AND
APPLICATION TO SIDE-CHANNEL COUNTERMEASURES 170
JEAN-SEBASTIEN GORON, ARNAB ROY, AND SRINIVAS VIVEK
SECURE CONVERSION BETWEEN BOOLEAN AND ARITHMETIC MASKING OF ANY
ORDER 188
JEAN-SEBASTIEN CORON, JOHANN GROFLSCHADL, AND
PRAVEEN KUMAR VADNALA
MAKING RSA-PSS PROVABLY SECURE AGAINST NON-RANDOM FAULTS 206
GILLES BARTHE, FRANGOIS DUPRESSOIR, PIERRE-ALAIN FOUQUE,
BENJAMIN GREGOIRE, MEHDI TIBOUCHI, AND
JEAN-CHRISTDPHE ZAPALOWICZ
ALGORITHM SPECIFIC SCA
SIDE-CHANNEL ATTACK AGAINST RSA KEY GENERATION ALGORITHMS 223
AURELIE BAUER, ELIANE JAULMES, VICTOR LOMNE,
EMMANUEL PROUFF, AND THOMAS ROCHE
GET YOUR HANDS OFF MY LAPTOP: PHYSICAL SIDE-CHANNEL KEY-EXTRACTION
ATTACKS ON PCS 242
DANIEL GENKIN, ITAMAR PIPMAN, AND ERAN TROMER
RSA MEETS DPA: RECOVERING RSA SECRET KEYS FROM NOISY ANALOG
DATA 261
NOBORU KUNIHIRO AND JUNYA HONDA
SIMPLE POWER ANALYSIS ON AES KEY EXPANSION REVISITED 279
CHRISTOPHE CLAVIER, DAMIEN MARION, AND ANTOINE WURCKER
ECC IMPLEMENTATIONS
EFFICIENT PAIRINGS AND ECC FOR EMBEDDED SYSTEMS 298
THOMAS UNTERLUGGAUER AND ERICH WENGER
CURVE41417: KARATSUBA REVISITED 316
DANIEL J. BERNSTEIN, CHITCHANOK CHUENGSATIANSUP, AND TANJA LANGE
IMPLEMENTATIONS
COFACTORIZATION ON GRAPHICS PROCESSING UNITS 335
ANDREA MIELE, JOPPE W. BOS, THORSTEN KLEINJUNG, AND
ARJEN K. LENSTRA
ENHANCED LATTICE-BASED SIGNATURES ON RECONFIGURABLE HARDWARE 353
THOMAS POPPELMANN, LEO DUCAS, AND TIM GIINEYSU
TABLE OF CONTENTS XIII
COMPACT RING-LWE CRYPTOPROCESSOR 371
SUJOY SINHA ROY, PREDERIK VERCAUTEREN, NELE MENTENS,
DONALD DONGLONG CHEN, AND INGRID VERBAUWHEDE
HARDWARE IMPLEMENTATIONS OF SYMMETRIC
CRYPTOSYSTEMS
ICEPOLE: HIGH-SPEED, HARDWARE-ORIENTED AUTHENTICATED
ENCRYPTION 392
PAWEL MORAWIECKI, KRIS GAJ, EKAWAT HOMSIRIKAMOL,
KRYSTIAN MATUSIEWICZ, JOSEF PIEPRZYK, MARTIN ROGAWSKI,
MARIAN SREBRNY, AND MARTIN WDJCIK
FPGA IMPLEMENTATIONS OF SPRING: AND THEIR COUNTERMEASURES
AGAINST SIDE-CHANNEL ATTACKS 414
HAI BRENNER, LUBOS GASPAR, GAETAN LEURENT, ALON ROSEN, AND
FRANGOIS-XAVIER STANDAERT
FOAM: SEARCHING FOR HARDWARE-OPTIMAL SPN STRUCTURES AND
COMPONENTS WITH A FAIR COMPARISON 433
KHOONGMING KHOO, THOMAS PEYRIN, AXEL Y. POSCHMANN, AND
HUIHUI YAP
PUFS
SECURE LIGHTWEIGHT ENTITY AUTHENTICATION WITH STRONG PUFS:
MISSION IMPOSSIBLE? 451
JEROEN DELVAUX, DAWU GU, DRIES SCHELLEKENS, AND
INGRID VERBAUWHEDE
EFFICIENT
POWER AND TIMING SIDE CHANNELS FOR PHYSICAL UNCLONABLE
FUNCTIONS 476
ULRICH RIIHRMAIR, XIAOLIN XU, JAN SOLTER, AHMED MAHMOUD,
MEHRDAD MAJZOOBI, FARINAZ KOUSHANFAR, AND WAYNE BURLESON
PHYSICAL CHARACTERIZATION OF ARBITER PUFS 493
SHAHIN TAJIK, ENRICO DIETZ, SVEN FROHMANN, JEAN-PIERRE SEIFERT,
DMITRY NEDOSPASOV, CLEMENS HELFRNEIER, CHRISTIAN BOIT, AND
HELMAR DITTRICH
BITLINE PUF: BUILDING NATIVE CHALLENGE-RESPONSE PUF CAPABILITY INTO
ANY SRAM 510
DANIEL E. HOLCOMB AND KEVIN FU
XIV TABLE OF CONTENTS
RNGS AND SCA ISSUES IN HARDWARE
EMBEDDED EVALUATION OF RANDOMNESS IN OSCILLATOR BASED ELEMENTARY
TRNG 527
VIKTOR FISCHER AND DAVID LUBICZ
ENTROPY EVALUATION FOR OSCILLATOR-BASED TRUE RANDOM NUMBER
GENERATORS 544
YUAN MA, JINGQIANG LIN, TIANYU CHEN, CHANGWEI XU,
ZONGBIN LIU, AND JIWU JING
SIDE-CHANNEL LEAKAGE THROUGH STATIC POWER: SHOULD WE CARE ABOUT IN
PRACTICE? 562
AMIR MORADI
GATE-LEVEL MASKING UNDER A PATH-BASED LEAKAGE METRIC 580
ANDREW J. LEISERSON, MARK E. MARSON, AND MEGAN A. WACHS
EARLY PROPAGATION AND IMBALANCED ROUTING, HOW TO DIMINISH IN
FPGAS 598
AMIR MORADI AND VINCENT IMMLER
AUTHOR INDEX 617 |
any_adam_object | 1 |
author_GND | (DE-588)1060230399 |
author_corporate | CHES Busan |
author_corporate_role | aut |
author_facet | CHES Busan |
author_sort | CHES Busan |
building | Verbundindex |
bvnumber | BV042122779 |
classification_rvk | SS 4800 |
classification_tum | DAT 260f DAT 130f DAT 465f |
ctrlnum | (OCoLC)894932197 (DE-599)DNB1054625166 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000008cb4500</leader><controlfield tag="001">BV042122779</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20141030</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">141016s2014 gw ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">14,N33</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1054625166</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662447086</subfield><subfield code="c">Pb. : ca. EUR 85.60 (DE) (freier Pr.), ca. EUR 88.00 (AT) (freier Pr.), ca. sfr 106.50 (freier Pr.)</subfield><subfield code="9">978-3-662-44708-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783662447086</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86379976</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)894932197</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1054625166</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 260f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 130f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">CHES</subfield><subfield code="n">16.</subfield><subfield code="d">2014</subfield><subfield code="c">Busan</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1059505223</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptographic hardware and embedded systems - CHES 2014</subfield><subfield code="b">16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings</subfield><subfield code="c">Lejla Batina ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Heidelberg [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 618 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8731</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hardwareentwurf</subfield><subfield code="0">(DE-588)4159103-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2014</subfield><subfield code="z">Pusan</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eingebettetes System</subfield><subfield code="0">(DE-588)4396978-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Hardwareentwurf</subfield><subfield code="0">(DE-588)4159103-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Batina, Lejla</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1060230399</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-662-44709-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8731</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">8731</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4738571&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027562984&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027562984</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2014 Pusan gnd-content |
genre_facet | Konferenzschrift 2014 Pusan |
id | DE-604.BV042122779 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:18:34Z |
institution | BVB |
institution_GND | (DE-588)1059505223 |
isbn | 9783662447086 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027562984 |
oclc_num | 894932197 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XIV, 618 S. Ill., graph. Darst. 235 mm x 155 mm |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | CHES 16. 2014 Busan Verfasser (DE-588)1059505223 aut Cryptographic hardware and embedded systems - CHES 2014 16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings Lejla Batina ... (eds.) Heidelberg [u.a.] Springer 2014 XIV, 618 S. Ill., graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 8731 Eingebettetes System (DE-588)4396978-1 gnd rswk-swf Hardwareentwurf (DE-588)4159103-3 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2014 Pusan gnd-content Eingebettetes System (DE-588)4396978-1 s Hardwareentwurf (DE-588)4159103-3 s Kryptologie (DE-588)4033329-2 s DE-604 Batina, Lejla Sonstige (DE-588)1060230399 oth Erscheint auch als Online-Ausgabe 978-3-662-44709-3 Lecture notes in computer science 8731 (DE-604)BV000000607 8731 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4738571&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027562984&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cryptographic hardware and embedded systems - CHES 2014 16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings Lecture notes in computer science Eingebettetes System (DE-588)4396978-1 gnd Hardwareentwurf (DE-588)4159103-3 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4396978-1 (DE-588)4159103-3 (DE-588)4033329-2 (DE-588)1071861417 |
title | Cryptographic hardware and embedded systems - CHES 2014 16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings |
title_auth | Cryptographic hardware and embedded systems - CHES 2014 16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings |
title_exact_search | Cryptographic hardware and embedded systems - CHES 2014 16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings |
title_full | Cryptographic hardware and embedded systems - CHES 2014 16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings Lejla Batina ... (eds.) |
title_fullStr | Cryptographic hardware and embedded systems - CHES 2014 16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings Lejla Batina ... (eds.) |
title_full_unstemmed | Cryptographic hardware and embedded systems - CHES 2014 16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings Lejla Batina ... (eds.) |
title_short | Cryptographic hardware and embedded systems - CHES 2014 |
title_sort | cryptographic hardware and embedded systems ches 2014 16th international workshop busan south korea september 23 26 2014 proceedings |
title_sub | 16th international workshop, Busan, South Korea, September 23 - 26, 2014 ; proceedings |
topic | Eingebettetes System (DE-588)4396978-1 gnd Hardwareentwurf (DE-588)4159103-3 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Eingebettetes System Hardwareentwurf Kryptologie Konferenzschrift 2014 Pusan |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4738571&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027562984&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT chesbusan cryptographichardwareandembeddedsystemsches201416thinternationalworkshopbusansouthkoreaseptember23262014proceedings AT batinalejla cryptographichardwareandembeddedsystemsches201416thinternationalworkshopbusansouthkoreaseptember23262014proceedings |