Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2015
|
Ausgabe: | 1st ed. 2015 |
Schriftenreihe: | Lecture Notes in Computer Science
9054 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XI, 600 p. 131 illus) |
ISBN: | 9783662481165 9783662481158 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-662-48116-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042788345 | ||
003 | DE-604 | ||
005 | 20150903 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150901s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783662481165 |c Online |9 978-3-662-48116-5 | ||
020 | |a 9783662481158 |c Print |9 978-3-662-48115-8 | ||
024 | 7 | |a 10.1007/978-3-662-48116-5 |2 doi | |
035 | |a (OCoLC)920801951 | ||
035 | |a (DE-599)BVBBV042788345 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Fast Software Encryption |b 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers |c edited by Gregor Leander |
250 | |a 1st ed. 2015 | ||
264 | 1 | |a Berlin [u.a.] |b Springer |c 2015 | |
300 | |a 1 Online-Ressource (XI, 600 p. 131 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9054 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Information Systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Blockchiffre |0 (DE-588)4323693-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Stromchiffre |0 (DE-588)4271270-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Istanbul |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 1 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 0 | 2 | |a Blockchiffre |0 (DE-588)4323693-5 |D s |
689 | 0 | 3 | |a Stromchiffre |0 (DE-588)4271270-1 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | 2 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 1 | 3 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Leander, Nils-Gregor |d 1975- |e Sonstige |0 (DE-588)129692719 |4 oth | |
711 | 2 | |a FSE |n 22. |d 2015 |c Istanbul |j Sonstige |0 (DE-588)1076035477 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9054 |w (DE-604)BV014880109 |9 9054 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-48116-5 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218222&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218222&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028218222 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804175020991184896 |
---|---|
adam_text | FAST SOFTWARE ENCRYPTION
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
BLOCK CIPHER CRYPTANALYSIS
UNDERSTANDING ATTACKS
IMPLEMENTATION ISSUES
MORE BLOCK CIPHER CRYPTANALYSIS
CRYPTANALYSIS OF AUTHENTICATED ENCRYPTION SCHEMES
PROOFS
DESIGN
LIGHTWEIGHT
CRYPTANALYSIS OF HASH FUNCTIONS AND STREAM CIPHERS
MASS SURVEILLANCE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
FAST SOFTWARE ENCRYPTION
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE
PROCEEDINGS OF THE 22ND INTERNATIONAL WORKSHOP ON FAST SOFTWARE
ENCRYPTION, HELD IN ISTANBUL, TURKEY, MARCH 8-11, 2015. THE 28 REVISED
FULL PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM 71
INITIAL SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON
BLOCK CIPHER CRYPTANALYSIS; UNDERSTANDING ATTACKS; IMPLEMENTATION
ISSUES; MORE BLOCK CIPHER CRYPTANALYSIS; CRYPTANALYSIS OF AUTHENTICATED
ENCRYPTION SCHEMES; PROOFS; DESIGN; LIGHTWEIGHT; CRYPTANALYSIS OF HASH
FUNCTIONS AND STREAM CIPHERS; AND MASS SURVEILLANCE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author_GND | (DE-588)129692719 |
building | Verbundindex |
bvnumber | BV042788345 |
classification_tum | DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)920801951 (DE-599)BVBBV042788345 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-48116-5 |
edition | 1st ed. 2015 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03669nmm a2200805zcb4500</leader><controlfield tag="001">BV042788345</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150903 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150901s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662481165</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-48116-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662481158</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-48115-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-48116-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)920801951</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042788345</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fast Software Encryption</subfield><subfield code="b">22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers</subfield><subfield code="c">edited by Gregor Leander</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 600 p. 131 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9054</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Stromchiffre</subfield><subfield code="0">(DE-588)4271270-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Istanbul</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Stromchiffre</subfield><subfield code="0">(DE-588)4271270-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Leander, Nils-Gregor</subfield><subfield code="d">1975-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)129692719</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">FSE</subfield><subfield code="n">22.</subfield><subfield code="d">2015</subfield><subfield code="c">Istanbul</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1076035477</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9054</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9054</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-48116-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218222&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218222&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028218222</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Istanbul gnd-content |
genre_facet | Konferenzschrift 2015 Istanbul |
id | DE-604.BV042788345 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:09:39Z |
institution | BVB |
institution_GND | (DE-588)1076035477 |
isbn | 9783662481165 9783662481158 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028218222 |
oclc_num | 920801951 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XI, 600 p. 131 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers edited by Gregor Leander 1st ed. 2015 Berlin [u.a.] Springer 2015 1 Online-Ressource (XI, 600 p. 131 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9054 0302-9743 Computer science Data protection Data encryption (Computer science) Coding theory Information Systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Coding and Information Theory Informatik Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Blockchiffre (DE-588)4323693-5 gnd rswk-swf Stromchiffre (DE-588)4271270-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2015 Istanbul gnd-content Kryptoanalyse (DE-588)4830502-9 s Hash-Algorithmus (DE-588)4323071-4 s Blockchiffre (DE-588)4323693-5 s Stromchiffre (DE-588)4271270-1 s Kryptosystem (DE-588)4209132-9 s DE-604 Authentifikation (DE-588)4330656-1 s 1\p DE-604 Leander, Nils-Gregor 1975- Sonstige (DE-588)129692719 oth FSE 22. 2015 Istanbul Sonstige (DE-588)1076035477 oth Lecture Notes in Computer Science 9054 (DE-604)BV014880109 9054 https://doi.org/10.1007/978-3-662-48116-5 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218222&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218222&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers Lecture Notes in Computer Science Computer science Data protection Data encryption (Computer science) Coding theory Information Systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Coding and Information Theory Informatik Hash-Algorithmus (DE-588)4323071-4 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Blockchiffre (DE-588)4323693-5 gnd Stromchiffre (DE-588)4271270-1 gnd Authentifikation (DE-588)4330656-1 gnd |
subject_GND | (DE-588)4323071-4 (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4323693-5 (DE-588)4271270-1 (DE-588)4330656-1 (DE-588)1071861417 |
title | Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers |
title_auth | Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers |
title_exact_search | Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers |
title_full | Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers edited by Gregor Leander |
title_fullStr | Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers edited by Gregor Leander |
title_full_unstemmed | Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers edited by Gregor Leander |
title_short | Fast Software Encryption |
title_sort | fast software encryption 22nd international workshop fse 2015 istanbul turkey march 8 11 2015 revised selected papers |
title_sub | 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers |
topic | Computer science Data protection Data encryption (Computer science) Coding theory Information Systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Coding and Information Theory Informatik Hash-Algorithmus (DE-588)4323071-4 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Blockchiffre (DE-588)4323693-5 gnd Stromchiffre (DE-588)4271270-1 gnd Authentifikation (DE-588)4330656-1 gnd |
topic_facet | Computer science Data protection Data encryption (Computer science) Coding theory Information Systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Coding and Information Theory Informatik Hash-Algorithmus Kryptoanalyse Kryptosystem Blockchiffre Stromchiffre Authentifikation Konferenzschrift 2015 Istanbul |
url | https://doi.org/10.1007/978-3-662-48116-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218222&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218222&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT leandernilsgregor fastsoftwareencryption22ndinternationalworkshopfse2015istanbulturkeymarch8112015revisedselectedpapers AT fseistanbul fastsoftwareencryption22ndinternationalworkshopfse2015istanbulturkeymarch8112015revisedselectedpapers |