LEADER 03980nam 22007335 450 001 996200345703316 005 20200704101017.0 010 $a3-319-16363-9 024 7 $a10.1007/978-3-319-16363-5 035 $a(CKB)3710000000379642 035 $a(SSID)ssj0001465589 035 $a(PQKBManifestationID)11792897 035 $a(PQKBTitleCode)TC0001465589 035 $a(PQKBWorkID)11472427 035 $a(PQKB)10887602 035 $a(DE-He213)978-3-319-16363-5 035 $a(MiAaPQ)EBC6284397 035 $a(MiAaPQ)EBC5579835 035 $a(Au-PeEL)EBL5579835 035 $a(OCoLC)905852083 035 $a(PPN)18489493X 035 $a(EXLCZ)993710000000379642 100 $a20150316d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aLightweight Cryptography for Security and Privacy$b[electronic resource] $eThird International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers /$fedited by Thomas Eisenbarth, Erdinç Öztürk 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XIII, 169 p. 33 illus.) 225 1 $aSecurity and Cryptology ;$v8898 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-16362-0 327 $aThe SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers -- The Multiplicative Complexity of Boolean Functions on Four and Five Variables -- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher -- AES Smaller Than S-Box: Minimalism in Software Design on Low End Microcontrollers -- Differential Factors: Improved Attacks on SERPENT -- Ciphertext-Only Fault Attacks on PRESENT -- Relating Undisturbed Bits to Other Properties of Substitution Boxes -- Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock -- Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers -- A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity. 330 $aThis book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: efficient implementations and designs; attacks; and protocols. 410 0$aSecurity and Cryptology ;$v8898 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputer communication systems 606 $aAlgorithms 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aEisenbarth$b Thomas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aÖztürk$b Erdinç$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996200345703316 996 $aLightweight Cryptography for Security and Privacy$92829839 997 $aUNISA