000 | 02697nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-662-43933-3 | ||
003 | DE-He213 | ||
005 | 20200421111653.0 | ||
007 | cr nn 008mamaa | ||
008 | 140707s2014 gw | s |||| 0|eng d | ||
020 |
_a9783662439333 _9978-3-662-43933-3 |
||
024 | 7 |
_a10.1007/978-3-662-43933-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
245 | 1 | 0 |
_aFast Software Encryption _h[electronic resource] : _b20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers / _cedited by Shiho Moriai. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2014. |
|
300 |
_aXIII, 605 p. 135 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8424 |
|
505 | 0 | _aBlock Ciphers -- Lightweight Block Ciphers -- Tweakable Block Ciphers -- Stream Ciphers -- Hash Functions -- Message Authentication Codes -- Provable Security -- Implementation Aspects -- Lightweight Authenticated Encryption -- Boolean Functions. | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013. The 30 revised full papers presented were carefully reviewed and selected from 97 initial submissions. The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers, stream ciphers, hash functions, message authentication codes, provable security, implementation aspects, lightweight authenticated encryption, automated cryptanalysis, Boolean functions. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aManagement information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aCoding and Information Theory. |
700 | 1 |
_aMoriai, Shiho. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783662439326 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8424 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-662-43933-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c54504 _d54504 |