Cryptographic Hardware and Embedded Systems – CHES 2011 [electronic resource] : 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings / edited by Bart Preneel, Tsuyoshi Takagi.
By: Preneel, Bart [editor.].
Contributor(s): Takagi, Tsuyoshi [editor.] | SpringerLink (Online service).
Material type:
BookSeries: Lecture Notes in Computer Science: 6917Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Description: XIV, 524 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642239519.Subject(s): Computer science | Data protection | Data structures (Computer science) | Data encryption (Computer science) | Coding theory | Computer software | Computational complexity | Computer Science | Data Encryption | Coding and Information Theory | Data Structures, Cryptology and Information Theory | Systems and Data Security | Algorithm Analysis and Problem Complexity | Discrete Mathematics in Computer ScienceDDC classification: 005.82 Online resources: Click here to access online
In:
Springer eBooksSummary: This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
There are no comments for this item.