Lightweight Cryptography for Security and Privacy: Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
8898 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 169 p.) Ill. |
ISBN: | 9783319163635 9783319163628 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-16363-5 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV042481923 | ||
003 | DE-604 | ||
005 | 20180131 | ||
007 | cr|uuu---uuuuu | ||
008 | 150402s2015 xx a||| o|||| 10||| eng d | ||
020 | |a 9783319163635 |c Online |9 978-3-319-16363-5 | ||
020 | |a 9783319163628 |c Print |9 978-3-319-16362-8 | ||
024 | 7 | |a 10.1007/978-3-319-16363-5 |2 doi | |
035 | |a (OCoLC)906197867 | ||
035 | |a (DE-599)BVBBV042481923 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-29 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.82 |2 22//ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Lightweight Cryptography for Security and Privacy |b Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers |c edited by Thomas Eisenbarth, Erdinç Öztürk |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (XIII, 169 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 8898 |x 0302-9743 | |
650 | 0 | 7 | |a Programmanalyse |0 (DE-588)4175841-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Blockchiffre |0 (DE-588)4323693-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2014 |z Istanbul |2 gnd-content | |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 3 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 0 | 4 | |a Programmanalyse |0 (DE-588)4175841-9 |D s |
689 | 0 | 5 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 6 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 8 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 2 | |a Blockchiffre |0 (DE-588)4323693-5 |D s |
689 | 1 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | 5 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Eisenbarth, Thomas |d 1984- |e Sonstige |0 (DE-588)1021100498 |4 oth | |
711 | 2 | |a LightSec |n 3. |d 2014 |c Istanbul |j Sonstige |0 (DE-588)1069360864 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 8898 |w (DE-604)BV014880109 |9 8898 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-16363-5 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916882&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916882&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027916882 |
Datensatz im Suchindex
_version_ | 1820875656793161728 |
---|---|
adam_text |
LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY
/ EISENBARTH, THOMAS
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
THE SIMON AND SPECK BLOCK CIPHERS ON AVR 8-BIT MICROCONTROLLERS
THE MULTIPLICATIVE COMPLEXITY OF BOOLEAN FUNCTIONS ON FOUR AND FIVE
VARIABLES
A FLEXIBLE AND COMPACT HARDWARE ARCHITECTURE FOR THE SIMON BLOCK CIPHER
AES SMALLER THAN S-BOX: MINIMALISM IN SOFTWARE DESIGN ON LOW END
MICROCONTROLLERS
DIFFERENTIAL FACTORS: IMPROVED ATTACKS ON SERPENT
CIPHERTEXT-ONLY FAULT ATTACKS ON PRESENT
RELATING UNDISTURBED BITS TO OTHER PROPERTIES OF SUBSTITUTION BOXES
DIFFERENTIAL SIEVING FOR 2-STEP MATCHING MEET-IN-THE-MIDDLE ATTACK WITH
APPLICATION TO LBLOCK
MATCH BOX MEET-IN-THE-MIDDLE ATTACKS ON THE SIMON FAMILY OF BLOCK
CIPHERS
A PROVABLY SECURE OFFLINE RFID YOKING-PROOF PROTOCOL WITH ANONYMITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY
/ EISENBARTH, THOMAS
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED POST-CONFERENCE PROCEEDINGS OF THE
THIRD INTERNATIONAL WORKSHOP ON LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY
AND PRIVACY, LIGHTSEC 2014, HELD IN ISTANBUL, TURKEY, IN SEPTEMBER 2014.
THE 10 FULL PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM
24 SUBMISSIONS. THE PAPERS ARE ORGANIZED IN THE FOLLOWING TOPICAL
SECTIONS: EFFICIENT IMPLEMENTATIONS AND DESIGNS; ATTACKS; AND PROTOCOLS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1021100498 |
building | Verbundindex |
bvnumber | BV042481923 |
classification_rvk | ST 276 ST 277 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)906197867 (DE-599)BVBBV042481923 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-16363-5 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV042481923</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180131</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150402s2015 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319163635</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-16363-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319163628</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-16362-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-16363-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)906197867</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042481923</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Lightweight Cryptography for Security and Privacy</subfield><subfield code="b">Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers</subfield><subfield code="c">edited by Thomas Eisenbarth, Erdinç Öztürk</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 169 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8898</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmanalyse</subfield><subfield code="0">(DE-588)4175841-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2014</subfield><subfield code="z">Istanbul</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Programmanalyse</subfield><subfield code="0">(DE-588)4175841-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="8"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Eisenbarth, Thomas</subfield><subfield code="d">1984-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1021100498</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">LightSec</subfield><subfield code="n">3.</subfield><subfield code="d">2014</subfield><subfield code="c">Istanbul</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1069360864</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8898</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8898</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-16363-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916882&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916882&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027916882</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2014 Istanbul gnd-content |
genre_facet | Konferenzschrift 2014 Istanbul |
id | DE-604.BV042481923 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:19:06Z |
institution | BVB |
institution_GND | (DE-588)1069360864 |
isbn | 9783319163635 9783319163628 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027916882 |
oclc_num | 906197867 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-706 DE-20 DE-739 DE-92 DE-29 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-706 DE-20 DE-739 DE-92 DE-29 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIII, 169 p.) Ill. |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers edited by Thomas Eisenbarth, Erdinç Öztürk Cham Springer International Publishing 2015 1 Online-Ressource (XIII, 169 p.) Ill. txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 8898 0302-9743 Programmanalyse (DE-588)4175841-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Software (DE-588)4055382-6 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Blockchiffre (DE-588)4323693-5 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2014 Istanbul gnd-content Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s Chiffrierung (DE-588)4352893-4 s Software (DE-588)4055382-6 s Programmanalyse (DE-588)4175841-9 s Computersicherheit (DE-588)4274324-2 s Privatsphäre (DE-588)4123980-5 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s DE-604 Blockchiffre (DE-588)4323693-5 s Kryptoanalyse (DE-588)4830502-9 s 1\p DE-604 Eisenbarth, Thomas 1984- Sonstige (DE-588)1021100498 oth LightSec 3. 2014 Istanbul Sonstige (DE-588)1069360864 oth Lecture Notes in Computer Science 8898 (DE-604)BV014880109 8898 https://doi.org/10.1007/978-3-319-16363-5 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916882&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916882&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers Lecture Notes in Computer Science Programmanalyse (DE-588)4175841-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Informatik (DE-588)4026894-9 gnd Computersicherheit (DE-588)4274324-2 gnd Software (DE-588)4055382-6 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datenschutz (DE-588)4011134-9 gnd Blockchiffre (DE-588)4323693-5 gnd Privatsphäre (DE-588)4123980-5 gnd Chiffrierung (DE-588)4352893-4 gnd |
subject_GND | (DE-588)4175841-9 (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4026894-9 (DE-588)4274324-2 (DE-588)4055382-6 (DE-588)4709127-7 (DE-588)4011134-9 (DE-588)4323693-5 (DE-588)4123980-5 (DE-588)4352893-4 (DE-588)1071861417 |
title | Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers |
title_auth | Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers |
title_exact_search | Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers |
title_full | Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers edited by Thomas Eisenbarth, Erdinç Öztürk |
title_fullStr | Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers edited by Thomas Eisenbarth, Erdinç Öztürk |
title_full_unstemmed | Lightweight Cryptography for Security and Privacy Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers edited by Thomas Eisenbarth, Erdinç Öztürk |
title_short | Lightweight Cryptography for Security and Privacy |
title_sort | lightweight cryptography for security and privacy third international workshop lightsec 2014 istanbul turkey september 1 2 2014 revised selected papers |
title_sub | Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers |
topic | Programmanalyse (DE-588)4175841-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Informatik (DE-588)4026894-9 gnd Computersicherheit (DE-588)4274324-2 gnd Software (DE-588)4055382-6 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datenschutz (DE-588)4011134-9 gnd Blockchiffre (DE-588)4323693-5 gnd Privatsphäre (DE-588)4123980-5 gnd Chiffrierung (DE-588)4352893-4 gnd |
topic_facet | Programmanalyse Kryptoanalyse Kryptosystem Informatik Computersicherheit Software Sicherheitsprotokoll Datenschutz Blockchiffre Privatsphäre Chiffrierung Konferenzschrift 2014 Istanbul |
url | https://doi.org/10.1007/978-3-319-16363-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916882&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916882&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT eisenbarththomas lightweightcryptographyforsecurityandprivacythirdinternationalworkshoplightsec2014istanbulturkeyseptember122014revisedselectedpapers AT lightsecistanbul lightweightcryptographyforsecurityandprivacythirdinternationalworkshoplightsec2014istanbulturkeyseptember122014revisedselectedpapers |