LEADER 02762nam 2200589 450 001 9910465473203321 005 20200520144314.0 010 $a1-4529-5166-7 035 $a(CKB)3710000000648082 035 $a(EBL)4392066 035 $a(SSID)ssj0001646179 035 $a(PQKBManifestationID)16417000 035 $a(PQKBTitleCode)TC0001646179 035 $a(PQKBWorkID)14868531 035 $a(PQKB)11606932 035 $a(MiAaPQ)EBC4392066 035 $a(OCoLC)947020568 035 $a(MdBmJHUP)muse51211 035 $a(Au-PeEL)EBL4392066 035 $a(CaPaEBR)ebr11203392 035 $a(CaONFJC)MIL915613 035 $a(EXLCZ)993710000000648082 100 $a20160428h20162016 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPothole confidential $emy life as mayor of Minneapolis /$fR. T. Rybak 210 1$aMinneapolis, Minnesota ;$aLondon, [England] :$cUniversity of Minnesota Press,$d2016. 210 4$dİ2016 215 $a1 online resource (329 p.) 300 $aIncludes index. 311 $a0-8166-9940-2 320 $aIncludes bibliographical references and index. 327 $aContents; Start in the Middle; The Beginning; No Longer a Game; Going to School, Not Necessarily at School; For a While the Path Seemed Really Clear; Not the Guy in the Back of the Room; Leaning Out; Leaning In; Back on Track; Winning; Showtime; Rookie Mistakes; Rookie Promise; Showing Up; Mount Weather; A Safe Place to Call Home; Officer Mike; Jesse Ventura and Two Drunk Firefighters; The Ripples of 9/11 and Paul Wellstone; Balance; New Year, New Governor; (Photographs); City Builder Starts Building City; McManus; Making the Save, Giving Up the Rebound; The Thin Line between Love and Respect 327 $aWhen Kids Kill KidsResults; Not So Isolated after All; Bridge Collapse; Two Campaigns; Two Campaigns of My Own; More Than Point A to Point B; The Next Generation; Tornados Real and Imagined; Minneapolis-the Brand; The Big Bang; The Way He Looked at His Son; ""No Ma?s""; (Photographs); My Favorite Year (Part 1); Big Night in the Summer of Love; My Favorite Year (Part 2); The End, Almost Literally; Why I Wrote This Book; Index 606 $aMayors$zMinneapolis$zMinnesota$vBiography 607 $aMinneapolis (Minn.)$xHistory 607 $aMinneapolis (Minn.)$xPolitics and government 607 $aMinneapolis (Minn.)$vBiography 608 $aElectronic books. 615 0$aMayors 676 $a977.6/053092 700 $aRybak$b R. T.$f1955-$0933148 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910465473203321 996 $aPothole confidential$92100279 997 $aUNINA LEADER 04937nam 22007335 450 001 996466458303316 005 20200705100424.0 010 $a3-319-64647-8 024 7 $a10.1007/978-3-319-64647-3 035 $a(CKB)4340000000061661 035 $a(DE-He213)978-3-319-64647-3 035 $a(MiAaPQ)EBC5592764 035 $a(PPN)203850076 035 $a(EXLCZ)994340000000061661 100 $a20170728d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aConstructive Side-Channel Analysis and Secure Design$b[electronic resource] $e8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers /$fedited by Sylvain Guilley 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (X, 299 p. 127 illus.) 225 1 $aSecurity and Cryptology ;$v10348 311 $a3-319-64646-X 327 $aDoes Coupling Affect the Security of Masked Implementations -- Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA -- Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors -- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA -- On the Construction of Side-Channel Attack Resilient S-boxes -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices -- Side-Channel Analysis of Keymill -- On the Easiness of Turning Higher-Order Leakages into First-Order -- Side-Channel Attacks against the Human Brain: The PIN Code Case Study -- Impacts of Technology Trends on Physical Attacks -- Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go -- DFA on LS-Designs with a Practical Implementation on SCREAM -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors -- Getting the Most out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand -- Mind the Gap: Towards Secure 1st-Order Masking in Software. 330 $aThis book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools. 410 0$aSecurity and Cryptology ;$v10348 606 $aComputer security 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aArchitecture, Computer 606 $aComputer science?Mathematics 606 $aMicroprogramming  606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer System Implementation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13057 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aControl Structures and Microprogramming$3https://scigraph.springernature.com/ontologies/product-market-codes/I12018 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aArchitecture, Computer. 615 0$aComputer science?Mathematics. 615 0$aMicroprogramming . 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer System Implementation. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aControl Structures and Microprogramming. 676 $a005.8 702 $aGuilley$b Sylvain$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466458303316 996 $aConstructive Side-Channel Analysis and Secure Design$91961252 997 $aUNISA