03202nam 22006135 450 991048404440332120200706010127.03-642-40349-210.1007/978-3-642-40349-1(CKB)3710000000002673(SSID)ssj0000962629(PQKBManifestationID)11573535(PQKBTitleCode)TC0000962629(PQKBWorkID)10975419(PQKB)10257751(DE-He213)978-3-642-40349-1(MiAaPQ)EBC3093396(PPN)172429374(EXLCZ)99371000000000267320130719d2013 u| 0engurnn|008mamaatxtccrCryptographic Hardware and Embedded Systems -- CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013, Proceedings /edited by Guido Marco Bertoni, Jean-Sébastien Coron1st ed. 2013.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2013.1 online resource (XIV, 490 p. 172 illus.) Security and Cryptology ;8086Bibliographic Level Mode of Issuance: Monograph3-642-40348-4 Side-channel attacks -- Physical unclonable function -- Lightweight cryptography -- Hardware implementations and fault attacks -- Efficient and secure implementations -- Elliptic curve cryptography -- masking -- Side-channel attacks and countermeasures.This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, held in Santa Barbara, CA, USA, in August 2013. The 27 papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptography; hardware implementations and fault attacks; efficient and secure implementations; elliptic curve cryptography; masking; side-channel attacks and countermeasures.Security and Cryptology ;8086Data encryption (Computer science)Computer securityAlgorithmsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Data encryption (Computer science).Computer security.Algorithms.Cryptology.Systems and Data Security.Algorithm Analysis and Problem Complexity.005.82Bertoni Guido Marcoedthttp://id.loc.gov/vocabulary/relators/edtCoron Jean-Sébastienedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910484044403321Cryptographic Hardware and Embedded Systems -- CHES 20132829794UNINA