LEADER 03251nam 22007095 450 001 9910483384503321 005 20200704025658.0 010 $a3-319-16763-4 024 7 $a10.1007/978-3-319-16763-3 035 $a(CKB)3710000000379661 035 $a(SSID)ssj0001465714 035 $a(PQKBManifestationID)11752787 035 $a(PQKBTitleCode)TC0001465714 035 $a(PQKBWorkID)11472743 035 $a(PQKB)11123914 035 $a(DE-He213)978-3-319-16763-3 035 $a(MiAaPQ)EBC6281748 035 $a(MiAaPQ)EBC5579190 035 $a(Au-PeEL)EBL5579190 035 $a(OCoLC)905852326 035 $a(PPN)18489512X 035 $a(EXLCZ)993710000000379661 100 $a20150316d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSmart Card Research and Advanced Applications $e13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers /$fedited by Marc Joye, Amir Moradi 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (X, 261 p. 76 illus.) 225 1 $aSecurity and Cryptology ;$v8968 300 $aIncludes index. 311 $a3-319-16762-6 327 $aJava cards -- Software countermeasures -- Side-channel analysis -- Embedded implementations -- Public-key cryptography -- Leakage and fault attacks. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography; and leakage and fault attacks. 410 0$aSecurity and Cryptology ;$v8968 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 676 $a006 702 $aJoye$b Marc$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMoradi$b Amir$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483384503321 996 $aSmart Card Research and Advanced Applications$93004629 997 $aUNINA