Why cryptography should not rely on physical attack complexity:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore [u.a.]
Springer
2015
|
Schriftenreihe: | T-Labs series in telecommunication services
|
Schlagworte: | |
Online-Zugang: | BHS01 BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9789812877871 |
DOI: | 10.1007/978-981-287-787-1 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043209176 | ||
003 | DE-604 | ||
005 | 20160107 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9789812877871 |c Online |9 978-981-287-787-1 | ||
024 | 7 | |a 10.1007/978-981-287-787-1 |2 doi | |
035 | |a (OCoLC)923649365 | ||
035 | |a (DE-599)BVBBV043209176 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1043 |a DE-B768 |a DE-Aug4 |a DE-898 |a DE-573 |a DE-859 |a DE-863 |a DE-634 |a DE-92 |a DE-862 |a DE-861 |a DE-706 | ||
082 | 0 | |a 621.382 |2 23 | |
100 | 1 | |a Krämer, Juliane I. |e Verfasser |0 (DE-588)1076589960 |4 aut | |
245 | 1 | 0 | |a Why cryptography should not rely on physical attack complexity |c Juliane Krämer |
264 | 1 | |a Singapore [u.a.] |b Springer |c 2015 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a T-Labs series in telecommunication services | |
650 | 4 | |a Engineering | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Computer science / Mathematics | |
650 | 4 | |a Computer mathematics | |
650 | 4 | |a System safety | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Mathematical Applications in Computer Science | |
650 | 4 | |a Informatik | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Mathematik | |
655 | 7 | |8 1\p |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-981-287-786-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-287-787-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632337&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632337&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632337 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l BHS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-287-787-1 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 589702 |
---|---|
_version_ | 1806179600798056448 |
adam_text | WHY CRYPTOGRAPHY SHOULD NOT RELY ON PHYSICAL ATTACK COMPLEXITY
/ KRAEMER, JULIANE
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
MATHEMATICAL AND CRYPTOLOGICAL BACKGROUND
PHOTONIC EMISSION ANALYSIS
THE PHOTONIC SIDE CHANNEL
HIGHER-ORDER FAULT ATTACKS AGAINST PAIRING COMPUTATIONS
FUTURE WORK AND CONCLUSION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
WHY CRYPTOGRAPHY SHOULD NOT RELY ON PHYSICAL ATTACK COMPLEXITY
/ KRAEMER, JULIANE
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK PRESENTS TWO PRACTICAL PHYSICAL ATTACKS. IT SHOWS HOW
ATTACKERS CAN REVEAL THE SECRET KEY OF SYMMETRIC AS WELL AS ASYMMETRIC
CRYPTOGRAPHIC ALGORITHMS BASED ON THESE ATTACKS, AND PRESENTS
COUNTERMEASURES ON THE SOFTWARE AND THE HARDWARE LEVEL THAT CAN HELP TO
PREVENT THEM IN THE FUTURE. THOUGH THEIR THEORY HAS BEEN KNOWN FOR
SEVERAL YEARS NOW, SINCE NEITHER ATTACK HAS YET BEEN SUCCESSFULLY
IMPLEMENTED IN PRACTICE, THEY HAVE GENERALLY NOT BEEN CONSIDERED A
SERIOUS THREAT. IN SHORT, THEIR PHYSICAL ATTACK COMPLEXITY HAS BEEN
OVERESTIMATED AND THE IMPLIED SECURITY THREAT HAS BEEN UNDERESTIMATED.
FIRST, THE BOOK INTRODUCES THE PHOTONIC SIDE CHANNEL, WHICH OFFERS NOT
ONLY TEMPORAL RESOLUTION, BUT ALSO THE HIGHEST POSSIBLE SPATIAL
RESOLUTION. DUE TO THE HIGH COST OF ITS INITIAL IMPLEMENTATION, IT HAS
NOT BEEN TAKEN SERIOUSLY. THE WORK SHOWS BOTH SIMPLE AND DIFFERENTIAL
PHOTONIC SIDE CHANNEL ANALYSES. THEN, IT PRESENTS A FAULT ATTACK AGAINST
PAIRING-BASED CRYPTOGRAPHY. DUE TO THE NEED FOR AT LEAST TWO INDEPENDENT
PRECISE FAULTS IN A SINGLE PAIRING COMPUTATION, IT HAS NOT BEEN TAKEN
SERIOUSLY EITHER. BASED ON THESE TWO ATTACKS, THE BOOK DEMONSTRATES THAT
THE ASSESSMENT OF PHYSICAL ATTACK COMPLEXITY IS ERROR-PRONE, AND AS SUCH
CRYPTOGRAPHY SHOULD NOT RELY ON IT. CRYPTOGRAPHIC TECHNOLOGIES HAVE TO
BE PROTECTED AGAINST ALL PHYSICAL ATTACKS, WHETHER THEY HAVE ALREADY
BEEN SUCCESSFULLY IMPLEMENTED OR NOT. THE DEVELOPMENT OF COUNTERMEASURES
DOES NOT REQUIRE THE SUCCESSFUL EXECUTION OF AN ATTACK BUT CAN ALREADY
BE CARRIED OUT AS SOON AS THE PRINCIPLE OF A SIDE CHANNEL OR A FAULT
ATTACK IS SUFFICIENTLY UNDERSTOOD
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Krämer, Juliane I. |
author_GND | (DE-588)1076589960 |
author_facet | Krämer, Juliane I. |
author_role | aut |
author_sort | Krämer, Juliane I. |
author_variant | j i k ji jik |
building | Verbundindex |
bvnumber | BV043209176 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)923649365 (DE-599)BVBBV043209176 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-981-287-787-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03609nmm a2200697zc 4500</leader><controlfield tag="001">BV043209176</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160107 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812877871</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-287-787-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-287-787-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)923649365</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209176</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-B768</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Krämer, Juliane I.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1076589960</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Why cryptography should not rely on physical attack complexity</subfield><subfield code="c">Juliane Krämer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">T-Labs series in telecommunication services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematical Applications in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-981-287-786-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632337&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632337&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632337</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">BHS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-287-787-1</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV043209176 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:11:35Z |
institution | BVB |
isbn | 9789812877871 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632337 |
oclc_num | 923649365 |
open_access_boolean | |
owner | DE-1046 DE-1043 DE-B768 DE-Aug4 DE-898 DE-BY-UBR DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-92 DE-862 DE-BY-FWS DE-861 DE-706 |
owner_facet | DE-1046 DE-1043 DE-B768 DE-Aug4 DE-898 DE-BY-UBR DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-92 DE-862 DE-BY-FWS DE-861 DE-706 |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG ZDB-2-ENG_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series2 | T-Labs series in telecommunication services |
spellingShingle | Krämer, Juliane I. Why cryptography should not rely on physical attack complexity Engineering Coding theory Computer science / Mathematics Computer mathematics System safety Electrical engineering Communications Engineering, Networks Coding and Information Theory Security Science and Technology Mathematical Applications in Computer Science Informatik Ingenieurwissenschaften Mathematik |
subject_GND | (DE-588)4113937-9 |
title | Why cryptography should not rely on physical attack complexity |
title_auth | Why cryptography should not rely on physical attack complexity |
title_exact_search | Why cryptography should not rely on physical attack complexity |
title_full | Why cryptography should not rely on physical attack complexity Juliane Krämer |
title_fullStr | Why cryptography should not rely on physical attack complexity Juliane Krämer |
title_full_unstemmed | Why cryptography should not rely on physical attack complexity Juliane Krämer |
title_short | Why cryptography should not rely on physical attack complexity |
title_sort | why cryptography should not rely on physical attack complexity |
topic | Engineering Coding theory Computer science / Mathematics Computer mathematics System safety Electrical engineering Communications Engineering, Networks Coding and Information Theory Security Science and Technology Mathematical Applications in Computer Science Informatik Ingenieurwissenschaften Mathematik |
topic_facet | Engineering Coding theory Computer science / Mathematics Computer mathematics System safety Electrical engineering Communications Engineering, Networks Coding and Information Theory Security Science and Technology Mathematical Applications in Computer Science Informatik Ingenieurwissenschaften Mathematik Hochschulschrift |
url | https://doi.org/10.1007/978-981-287-787-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632337&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632337&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kramerjulianei whycryptographyshouldnotrelyonphysicalattackcomplexity |