000772402 000__ 02934cam\a2200589Mi\4500 000772402 001__ 772402 000772402 005__ 20230306142539.0 000772402 006__ m\\\\\o\\d\\\\\\\\ 000772402 007__ cr\un\nnnunnun 000772402 008__ 161117s2016\\\\gw\a\\\\o\\\\\100\0\eng\d 000772402 020__ $$a9783319494456$$q(electronic book) 000772402 020__ $$a3319494457$$q(electronic book) 000772402 020__ $$z9783319494449 000772402 0247_ $$a10.1007/978-3-319-49445-6$$2doi 000772402 035__ $$aSP(OCoLC)ocn967502452 000772402 035__ $$aSP(OCoLC)967502452 000772402 040__ $$aSFB$$beng$$epn$$cSFB$$dOCLCO$$dGW5XE$$dOCLCO$$dOCLCF$$dUAB$$dCOO$$dOCLCQ 000772402 049__ $$aISEA 000772402 050_4 $$aQA76.9.A25 000772402 08204 $$a005.8/2$$223 000772402 1112_ $$aSPACE (Conference : Applied cryptography engineering)$$n(6th :$$d2016 :$$cHyderabad, India) 000772402 24510 $$aSecurity, privacy, and applied cryptography engineering :$$b6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings /$$cedited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat. 000772402 2463_ $$aSPACE 2016 000772402 264_1 $$aCham :$$bSpringer,$$c2016. 000772402 300__ $$a1 online resource (xxiii, 420 pages) :$$billustrations. 000772402 336__ $$atext$$btxt$$2rdacontent 000772402 337__ $$acomputer$$bc$$2rdamedia 000772402 338__ $$aonline resource$$bcr$$2rdacarrier 000772402 347__ $$atext file$$bPDF$$2rda 000772402 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v10076 000772402 4901_ $$aLNCS sublibrary. SL4, Security and cryptology 000772402 5050_ $$aDeep learning and Fault Based Attacks -- Leakage, Power and Fault Analysis -- Applied cryptography -- Iterative ciphers -- Hardware security -- Security -- Post-quantum cryptology. 000772402 506__ $$aAccess limited to authorized users. 000772402 520__ $$aThis book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, held in Hyderabad, India, in December 2016. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design. 000772402 650_0 $$aData encryption (Computer science)$$vCongresses. 000772402 650_0 $$aComputer security$$vCongresses. 000772402 650_0 $$aComputer science. 000772402 650_0 $$aSoftware engineering. 000772402 650_0 $$aData encryption (Computer science) 000772402 650_0 $$aAlgorithms. 000772402 650_0 $$aManagement information systems. 000772402 7001_ $$aCarlet, Claude,$$eeditor. 000772402 7001_ $$aHasan, M. Anwar,$$eeditor. 000772402 7001_ $$aSaraswat, Vishal,$$eeditor. 000772402 77608 $$iPrint version:$$z9783319494449 000772402 830_0 $$aLecture notes in computer science ;$$v10076.$$x0302-9743 000772402 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000772402 852__ $$bebk 000772402 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-49445-6$$zOnline Access$$91397441.1 000772402 909CO $$ooai:library.usi.edu:772402$$pGLOBAL_SET 000772402 936__ $$aP2E Portfolio 000772402 980__ $$aEBOOK 000772402 980__ $$aBIB 000772402 982__ $$aEbook 000772402 983__ $$aOnline 000772402 994__ $$a92$$bISE