LEADER 04630nam 22008415 450 001 996202531703316 005 20200630182529.0 010 $a3-319-10175-7 024 7 $a10.1007/978-3-319-10175-0 035 $a(CKB)3710000000227369 035 $a(SSID)ssj0001338672 035 $a(PQKBManifestationID)11898512 035 $a(PQKBTitleCode)TC0001338672 035 $a(PQKBWorkID)11338076 035 $a(PQKB)10818354 035 $a(DE-He213)978-3-319-10175-0 035 $a(MiAaPQ)EBC6287279 035 $a(MiAaPQ)EBC5586595 035 $a(Au-PeEL)EBL5586595 035 $a(OCoLC)889234321 035 $a(PPN)180626116 035 $a(EXLCZ)993710000000227369 100 $a20140814d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aConstructive Side-Channel Analysis and Secure Design$b[electronic resource] $e5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers /$fedited by Emmanuel Prouff 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (X, 313 p. 110 illus.) 225 1 $aSecurity and Cryptology ;$v8622 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-10174-9 327 $aA note on the use of margins to compare distinguishers -- A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis -- Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES -- Addition with Blinded Operands -- On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance -- Common Points on Elliptic Curves: The Achille's Heel of Fault Attack Countermeasures -- On Adaptive Bandwidth Selection for Efficient MIA -- Generic DPA attacks: curse or blessing? -- Template Attacks on Different Devices -- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis -- A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box Conditions and a Countermeasure -- Adjusting laser injections for fully controlled faults. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure. 410 0$aSecurity and Cryptology ;$v8622 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer security 606 $aComputers and civilization 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 676 $a005.8 702 $aProuff$b Emmanuel$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996202531703316 996 $aConstructive Side-Channel Analysis and Secure Design$91961252 997 $aUNISA LEADER 03595nam 22008773u 450 001 9910781581203321 005 20230725053804.0 035 $a(CKB)2550000000064909 035 $a(EBL)908922 035 $a(OCoLC)767569020 035 $a(SSID)ssj0000620752 035 $a(PQKBManifestationID)12265677 035 $a(PQKBTitleCode)TC0000620752 035 $a(PQKBWorkID)10613253 035 $a(PQKB)10739114 035 $a(MiAaPQ)EBC908922 035 $a(EXLCZ)992550000000064909 100 $a20130418d2011|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aUncreative Writing$b[electronic resource] $eManaging Language in the Digital Age 210 $aNew York $cColumbia University Press$d2011 215 $a1 online resource (272 p.) 300 $aDescription based upon print version of record. 311 $a0-231-14990-5 311 $a0-231-14991-3 330 $aCan techniques traditionally thought to be outside the scope of literature, including word processing, databasing, identity ciphering, and intensive programming, inspire the reinvention of writing? The Internet and the digital environment present writers with new challenges and opportunities to reconceive creativity, authorship, and their relationship to language. Confronted with an unprecedented amount of texts and language, writers have the opportunity to move beyond the creation of new texts and manage, parse, appropriate, and reconstruct those that already exist.In addition to 606 $aAuthors -- Effect of technological innovations on 606 $aCreation (Literary, artistic, etc.) 606 $aCreative writing -- Data processing 606 $aCreative writing -- Study and teaching 606 $aLiterature and technology 606 $aLiterature and the Internet 606 $aModernism (Literature) -- History and criticism 606 $aPoetics 606 $aLiterature and technology$xData processing 606 $aCreation (Literary, artistic, etc.)$xStudy and teaching 606 $aCreative writing$xEffect of technological innovations on 606 $aCreative writing$xHistory and criticism 606 $aAuthors 606 $aLiterature and the Internet 606 $aModernism (Literature) 606 $aPoetics 606 $aLanguages & Literatures$2HILCC 606 $aLiterature - General$2HILCC 615 4$aAuthors -- Effect of technological innovations on. 615 4$aCreation (Literary, artistic, etc.). 615 4$aCreative writing -- Data processing. 615 4$aCreative writing -- Study and teaching. 615 4$aLiterature and technology. 615 4$aLiterature and the Internet. 615 4$aModernism (Literature) -- History and criticism. 615 4$aPoetics. 615 0$aLiterature and technology$xData processing 615 0$aCreation (Literary, artistic, etc.)$xStudy and teaching 615 0$aCreative writing$xEffect of technological innovations on 615 0$aCreative writing$xHistory and criticism 615 0$aAuthors 615 0$aLiterature and the Internet 615 0$aModernism (Literature) 615 0$aPoetics 615 7$aLanguages & Literatures 615 7$aLiterature - General 676 $a808.00285/4678 676 $a808.002854678 700 $aGoldsmith$b Kenneth$01564760 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910781581203321 996 $aUncreative Writing$93834003 997 $aUNINA