Security, privacy, and applied cryptography engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings / edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat.
2016
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Security, privacy, and applied cryptography engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings / edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat.
ISBN
9783319494456 (electronic book)
3319494457 (electronic book)
9783319494449
3319494457 (electronic book)
9783319494449
Published
Cham : Springer, 2016.
Language
English
Description
1 online resource (xxiii, 420 pages) : illustrations.
Item Number
10.1007/978-3-319-49445-6 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8/2
Summary
This book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, held in Hyderabad, India, in December 2016. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file PDF
Series
Lecture notes in computer science ; 10076. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Print version: 9783319494449
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Deep learning and Fault Based Attacks
Leakage, Power and Fault Analysis
Applied cryptography
Iterative ciphers
Hardware security
Security
Post-quantum cryptology.
Leakage, Power and Fault Analysis
Applied cryptography
Iterative ciphers
Hardware security
Security
Post-quantum cryptology.