000733950 000__ 03019cam\a2200541Ii\4500 000733950 001__ 733950 000733950 005__ 20230306141113.0 000733950 006__ m\\\\\o\\d\\\\\\\\ 000733950 007__ cr\cn\nnnunnun 000733950 008__ 150911s2015\\\\gw\a\\\\o\\\\\101\0\eng\d 000733950 019__ $$a919684893 000733950 020__ $$a9783662483244$$qelectronic book 000733950 020__ $$a3662483246$$qelectronic book 000733950 020__ $$z9783662483237 000733950 020__ $$z3662483238 000733950 0247_ $$a10.1007/978-3-662-48324-4$$2doi 000733950 035__ $$aSP(OCoLC)ocn920894470 000733950 035__ $$aSP(OCoLC)920894470$$z(OCoLC)919684893 000733950 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dYDXCP$$dSNK$$dOCLCF$$dOCLCO 000733950 049__ $$aISEA 000733950 050_4 $$aQA76.9.A25 000733950 08204 $$a005.8$$223 000733950 1112_ $$aCHES (Workshop)$$n(17th :$$d2015 :$$cSaint-Malo, France) 000733950 24510 $$aCryptographic hardware and embedded systems -- CHES 2015$$h[electronic resource] :$$b17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings /$$cTim Güneysu, Helena Handschuh (eds.). 000733950 2463_ $$aCHES 2015 000733950 264_1 $$aHeidelberg :$$bSpringer,$$c2015. 000733950 300__ $$a1 online resource (xiv, 704 pages) :$$billustrations. 000733950 336__ $$atext$$btxt$$2rdacontent 000733950 337__ $$acomputer$$bc$$2rdamedia 000733950 338__ $$aonline resource$$bcr$$2rdacarrier 000733950 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v9293 000733950 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000733950 500__ $$aInternational conference proceedings. 000733950 500__ $$aIncludes author index. 000733950 506__ $$aAccess limited to authorized users. 000733950 520__ $$aThis book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully reviewed and selected from 128 submissions. They are organized in the following topical sections: processing techniques in side-channel analysis; cryptographic hardware implementations; homomorphic encryption in hardware; side-channel attacks on public key cryptography; cipher design and cryptanalysis; true random number generators and entropy estimations; side-channel analysis and fault injection attacks; higher-order side-channel attacks; physically unclonable functions and hardware trojans; side-channel attacks in practice; and lattice-based implementations. 000733950 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 11, 2015). 000733950 650_0 $$aData encryption (Computer science)$$vCongresses. 000733950 650_0 $$aComputer security$$vCongresses. 000733950 7001_ $$aGüneysu, Tim,$$eeditor. 000733950 7001_ $$aHandschuh, Helena,$$eeditor. 000733950 77608 $$iPrint version:$$z3662483238$$z9783662483237$$w(OCoLC)915120270 000733950 830_0 $$aLecture notes in computer science ;$$v9293. 000733950 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000733950 852__ $$bebk 000733950 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-662-48324-4$$zOnline Access$$91397441.1 000733950 909CO $$ooai:library.usi.edu:733950$$pGLOBAL_SET 000733950 980__ $$aEBOOK 000733950 980__ $$aBIB 000733950 982__ $$aEbook 000733950 983__ $$aOnline 000733950 994__ $$a92$$bISE