LEADER 03623nam 22006735 450 001 9910484945703321 005 20251226200006.0 010 $a3-642-40392-1 024 7 $a10.1007/978-3-642-40392-7 035 $a(CKB)3710000000015920 035 $a(SSID)ssj0000988197 035 $a(PQKBManifestationID)11534672 035 $a(PQKBTitleCode)TC0000988197 035 $a(PQKBWorkID)10949344 035 $a(PQKB)10191954 035 $a(DE-He213)978-3-642-40392-7 035 $a(MiAaPQ)EBC3093147 035 $a(PPN)172429439 035 $a(EXLCZ)993710000000015920 100 $a20130820d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aLightweight Cryptography for Security and Privacy $e2nd International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers /$fedited by Gildas Avoine, Orhun Kara 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (X, 143 p. 24 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8162 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-40391-3 327 $aEfficient Implementations and designs -- A Lightweight ATmega-based Application-Specific Instruction-Set Processor for Elliptic Curve Cryptography -- ITUbee: A Software Oriented Lightweight Block Cipher -- Block Cipher Cryptanalysis -- Related-Key Slide Attacks on Block Ciphers with Secret Components -- Differential Fault Attack on the PRINCE Block Cipher -- Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128 -- Wireless Sensor Networks -- An Implementation of the Hash-Chain Signature Scheme for Wireless Sensor Networks -- An adaptive security architecture for location privacy sensitive sensor network applications -- Cryptographic Protocols -- Secure & Lightweight Distance-Bounding -- Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol -- An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer. 330 $aThis book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in Gebze, Turkey, during May 6-7, 2013. The 10 full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are grouped in topical sections on efficient Implementations and designs, block cipher cryptanalysis, wireless sensor networks, and cryptographic protocols. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8162 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer networks 606 $aCryptology 606 $aData and Information Security 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aAvoine$b Gildas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKara$b Orhun$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484945703321 996 $aLightweight Cryptography for Security and Privacy$92829839 997 $aUNINA