Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
8540 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XI, 636 p. 155 illus) |
ISBN: | 9783662467060 9783662467053 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-662-46706-0 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV042544876 | ||
003 | DE-604 | ||
005 | 20160720 | ||
007 | cr|uuu---uuuuu | ||
008 | 150506s2015 xx o|||| 10||| eng d | ||
020 | |a 9783662467060 |c Online |9 978-3-662-46706-0 | ||
020 | |a 9783662467053 |c Print |9 978-3-662-46705-3 | ||
024 | 7 | |a 10.1007/978-3-662-46706-0 |2 doi | |
035 | |a (OCoLC)908701719 | ||
035 | |a (DE-599)BVBBV042544876 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Fast Software Encryption |b 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers |c edited by Carlos Cid, Christian Rechberger |
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2015 | |
300 | |a 1 Online-Ressource (XI, 636 p. 155 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 8540 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Information Systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Blockchiffre |0 (DE-588)4323693-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Stromchiffre |0 (DE-588)4271270-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2014 |z London |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 2 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 0 | 3 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 1 | 2 | |a Blockchiffre |0 (DE-588)4323693-5 |D s |
689 | 1 | 3 | |a Stromchiffre |0 (DE-588)4271270-1 |D s |
689 | 1 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Cid, Carlos |e Sonstige |0 (DE-588)1020927186 |4 oth | |
711 | 2 | |a FSE |n 21. |d 2014 |c London |j Sonstige |0 (DE-588)107086739X |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 8540 |w (DE-604)BV014880109 |9 8540 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-46706-0 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978882&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978882&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027978882 |
Datensatz im Suchindex
_version_ | 1820875660219908096 |
---|---|
adam_text |
FAST SOFTWARE ENCRYPTION
/ CID, CARLOS
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
DESIGNS
CRYPTANALYSIS
AUTHENTICATED ENCRYPTION
FOUNDATIONS AND THEORY
STREAM CIPHERS
HASH FUNCTIONS
ADVANCED CONSTRUCTIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
FAST SOFTWARE ENCRYPTION
/ CID, CARLOS
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE
PROCEEDINGS OF THE 21ST INTERNATIONAL WORKSHOP ON FAST SOFTWARE
ENCRYPTION, HELD IN LONDON, UK, MARCH 3-5, 2014. THE 31 REVISED FULL
PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM 99 INITIAL
SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON DESIGNS;
CRYPTANALYSIS; AUTHENTICATED ENCRYPTION; FOUNDATIONS AND THEORY; STREAM
CIPHERS; HASH FUNCTIONS; ADVANCED CONSTRUCTIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1020927186 |
building | Verbundindex |
bvnumber | BV042544876 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)908701719 (DE-599)BVBBV042544876 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-46706-0 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV042544876</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160720</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150506s2015 xx o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662467060</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-46706-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662467053</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-46705-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-46706-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908701719</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042544876</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fast Software Encryption</subfield><subfield code="b">21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers</subfield><subfield code="c">edited by Carlos Cid, Christian Rechberger</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 636 p. 155 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8540</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Stromchiffre</subfield><subfield code="0">(DE-588)4271270-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2014</subfield><subfield code="z">London</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Stromchiffre</subfield><subfield code="0">(DE-588)4271270-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cid, Carlos</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1020927186</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">FSE</subfield><subfield code="n">21.</subfield><subfield code="d">2014</subfield><subfield code="c">London</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)107086739X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8540</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8540</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-46706-0</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978882&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978882&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027978882</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2014 London gnd-content |
genre_facet | Konferenzschrift 2014 London |
id | DE-604.BV042544876 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:19:10Z |
institution | BVB |
institution_GND | (DE-588)107086739X |
isbn | 9783662467060 9783662467053 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027978882 |
oclc_num | 908701719 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XI, 636 p. 155 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers edited by Carlos Cid, Christian Rechberger Berlin, Heidelberg Springer Berlin Heidelberg 2015 1 Online-Ressource (XI, 636 p. 155 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 8540 0302-9743 Computer science Data protection Data encryption (Computer science) Coding theory Information Systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Coding and Information Theory Informatik Authentifikation (DE-588)4330656-1 gnd rswk-swf Blockchiffre (DE-588)4323693-5 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Stromchiffre (DE-588)4271270-1 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2014 London gnd-content Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Hash-Algorithmus (DE-588)4323071-4 s Authentifikation (DE-588)4330656-1 s DE-604 Blockchiffre (DE-588)4323693-5 s Stromchiffre (DE-588)4271270-1 s Cid, Carlos Sonstige (DE-588)1020927186 oth FSE 21. 2014 London Sonstige (DE-588)107086739X oth Lecture Notes in Computer Science 8540 (DE-604)BV014880109 8540 https://doi.org/10.1007/978-3-662-46706-0 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978882&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978882&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers Lecture Notes in Computer Science Computer science Data protection Data encryption (Computer science) Coding theory Information Systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Coding and Information Theory Informatik Authentifikation (DE-588)4330656-1 gnd Blockchiffre (DE-588)4323693-5 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Stromchiffre (DE-588)4271270-1 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
subject_GND | (DE-588)4330656-1 (DE-588)4323693-5 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4271270-1 (DE-588)4323071-4 (DE-588)1071861417 |
title | Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers |
title_auth | Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers |
title_exact_search | Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers |
title_full | Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers edited by Carlos Cid, Christian Rechberger |
title_fullStr | Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers edited by Carlos Cid, Christian Rechberger |
title_full_unstemmed | Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers edited by Carlos Cid, Christian Rechberger |
title_short | Fast Software Encryption |
title_sort | fast software encryption 21st international workshop fse 2014 london uk march 3 5 2014 revised selected papers |
title_sub | 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers |
topic | Computer science Data protection Data encryption (Computer science) Coding theory Information Systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Coding and Information Theory Informatik Authentifikation (DE-588)4330656-1 gnd Blockchiffre (DE-588)4323693-5 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Stromchiffre (DE-588)4271270-1 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
topic_facet | Computer science Data protection Data encryption (Computer science) Coding theory Information Systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Coding and Information Theory Informatik Authentifikation Blockchiffre Kryptosystem Kryptoanalyse Stromchiffre Hash-Algorithmus Konferenzschrift 2014 London |
url | https://doi.org/10.1007/978-3-662-46706-0 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978882&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978882&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT cidcarlos fastsoftwareencryption21stinternationalworkshopfse2014londonukmarch352014revisedselectedpapers AT fselondon fastsoftwareencryption21stinternationalworkshopfse2014londonukmarch352014revisedselectedpapers |