Constructive side-channel analysis and secure design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: COSADE Paris (VerfasserIn)
Weitere Verfasser: Guilley, Sylvain (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham Springer [2017]
Schriftenreihe:Lecture Notes in Computer Science 10348
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-91
DE-384
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV044474217
003 DE-604
005 20211227
007 cr|uuu---uuuuu
008 170905s2017 xx a||| o|||| 10||| eng d
020 |a 9783319646473  |c Online  |9 978-3-319-64647-3 
024 7 |a 10.1007/978-3-319-64647-3  |2 doi 
035 |a (ZDB-2-SCS)9783319646473 
035 |a (ZDB-2-LNC)9783319646473 
035 |a (OCoLC)1004339517 
035 |a (DE-599)BVBBV044474217 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-860  |a DE-91  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634  |a DE-384  |a DE-355  |a DE-188  |a DE-19 
082 0 |a 005.8  |2 23 
084 |a DAT 000  |2 stub 
111 2 |a COSADE  |n 8.  |d 2017  |c Paris  |j Verfasser  |0 (DE-588)1138450243  |4 aut 
245 1 0 |a Constructive side-channel analysis and secure design  |b 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers  |c Sylvain Guilley (Ed.) 
264 1 |a Cham  |b Springer  |c [2017] 
300 |a 1 Online-Ressource (X, 298 Seiten)  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 10348  |x 0302-9743 
650 4 |a Computer science 
650 4 |a Microprogramming 
650 4 |a Architecture, Computer 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Computer science / Mathematics 
650 4 |a Management information systems 
650 4 |a Computer Science 
650 4 |a Systems and Data Security 
650 4 |a Data Encryption 
650 4 |a Management of Computing and Information Systems 
650 4 |a Computer System Implementation 
650 4 |a Discrete Mathematics in Computer Science 
650 4 |a Control Structures and Microprogramming 
650 4 |a Informatik 
650 4 |a Mathematik 
650 0 7 |a Differentielle Kryptoanalyse  |0 (DE-588)4367918-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Seitenkanalattacke  |0 (DE-588)7546808-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Hardwareentwurf  |0 (DE-588)4159103-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Fehleranalyse  |0 (DE-588)4016608-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Implementierung  |g Informatik  |0 (DE-588)4026663-1  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
689 0 0 |a Seitenkanalattacke  |0 (DE-588)7546808-6  |D s 
689 0 1 |a Fehleranalyse  |0 (DE-588)4016608-9  |D s 
689 0 2 |a Differentielle Kryptoanalyse  |0 (DE-588)4367918-3  |D s 
689 0 3 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 0 4 |a Implementierung  |g Informatik  |0 (DE-588)4026663-1  |D s 
689 0 5 |a Hardwareentwurf  |0 (DE-588)4159103-3  |D s 
689 0 |5 DE-604 
700 1 |a Guilley, Sylvain  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-319-64646-6 
830 0 |a Lecture Notes in Computer Science  |v 10348  |w (DE-604)BV014880109  |9 10348 
856 4 0 |u https://doi.org/10.1007/978-3-319-64647-3  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2017 
940 1 |q ZDB-2-LNC_2017 
943 1 |a oai:aleph.bib-bvb.de:BVB01-029874548 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-634  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-Aug4  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-573  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-M347  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-92  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-898  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-859  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-860  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-861  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-863  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-862  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-523  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-91  |p ZDB-2-LNC  |q ZDB-2-LNC_2017  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-384  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-473  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-19  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-703  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-20  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-706  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-29  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-64647-3  |l DE-739  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2285064
DE-BY-UBG_katkey 196343085
DE-BY-UBG_local_url https://doi.org/10.1007/978-3-319-64647-3
Verlag
DE-BY-UBM_katkey 6108667
DE-BY-UBM_local_url Verlag
https://doi.org/10.1007/978-3-319-64647-3
DE-BY-UBR_katkey 5933483
_version_ 1824053359263350784
adam_text
any_adam_object
author2 Guilley, Sylvain
author2_role edt
author2_variant s g sg
author_corporate COSADE Paris
author_corporate_role aut
author_facet Guilley, Sylvain
COSADE Paris
author_sort COSADE Paris
building Verbundindex
bvnumber BV044474217
classification_rvk SS 4800
classification_tum DAT 000
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783319646473
(ZDB-2-LNC)9783319646473
(OCoLC)1004339517
(DE-599)BVBBV044474217
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-64647-3
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV044474217</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211227</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170905s2017 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319646473</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-64647-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-64647-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319646473</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783319646473</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1004339517</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044474217</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">COSADE</subfield><subfield code="n">8.</subfield><subfield code="d">2017</subfield><subfield code="c">Paris</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1138450243</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Constructive side-channel analysis and secure design</subfield><subfield code="b">8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers</subfield><subfield code="c">Sylvain Guilley (Ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 298 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">10348</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microprogramming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture, Computer</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer System Implementation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Discrete Mathematics in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Control Structures and Microprogramming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Differentielle Kryptoanalyse</subfield><subfield code="0">(DE-588)4367918-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Seitenkanalattacke</subfield><subfield code="0">(DE-588)7546808-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hardwareentwurf</subfield><subfield code="0">(DE-588)4159103-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Fehleranalyse</subfield><subfield code="0">(DE-588)4016608-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Implementierung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4026663-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Seitenkanalattacke</subfield><subfield code="0">(DE-588)7546808-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Fehleranalyse</subfield><subfield code="0">(DE-588)4016608-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Differentielle Kryptoanalyse</subfield><subfield code="0">(DE-588)4367918-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Implementierung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4026663-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Hardwareentwurf</subfield><subfield code="0">(DE-588)4159103-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Guilley, Sylvain</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-64646-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">10348</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">10348</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2017</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2017</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029874548</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2017</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-64647-3</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV044474217
illustrated Illustrated
indexdate 2025-02-14T18:03:32Z
institution BVB
institution_GND (DE-588)1138450243
isbn 9783319646473
issn 0302-9743
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029874548
oclc_num 1004339517
open_access_boolean
owner DE-860
DE-91
DE-BY-TUM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
DE-384
DE-355
DE-BY-UBR
DE-188
DE-19
DE-BY-UBM
owner_facet DE-860
DE-91
DE-BY-TUM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
DE-384
DE-355
DE-BY-UBR
DE-188
DE-19
DE-BY-UBM
physical 1 Online-Ressource (X, 298 Seiten) Illustrationen, Diagramme
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2017
ZDB-2-LNC_2017
ZDB-2-LNC ZDB-2-LNC_2017
publishDate 2017
publishDateSearch 2017
publishDateSort 2017
publisher Springer
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spellingShingle Constructive side-channel analysis and secure design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers
Lecture Notes in Computer Science
Computer science
Microprogramming
Architecture, Computer
Computer security
Data encryption (Computer science)
Computer science / Mathematics
Management information systems
Computer Science
Systems and Data Security
Data Encryption
Management of Computing and Information Systems
Computer System Implementation
Discrete Mathematics in Computer Science
Control Structures and Microprogramming
Informatik
Mathematik
Differentielle Kryptoanalyse (DE-588)4367918-3 gnd
Kryptosystem (DE-588)4209132-9 gnd
Seitenkanalattacke (DE-588)7546808-6 gnd
Hardwareentwurf (DE-588)4159103-3 gnd
Fehleranalyse (DE-588)4016608-9 gnd
Implementierung Informatik (DE-588)4026663-1 gnd
subject_GND (DE-588)4367918-3
(DE-588)4209132-9
(DE-588)7546808-6
(DE-588)4159103-3
(DE-588)4016608-9
(DE-588)4026663-1
(DE-588)1071861417
title Constructive side-channel analysis and secure design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers
title_auth Constructive side-channel analysis and secure design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers
title_exact_search Constructive side-channel analysis and secure design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers
title_full Constructive side-channel analysis and secure design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers Sylvain Guilley (Ed.)
title_fullStr Constructive side-channel analysis and secure design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers Sylvain Guilley (Ed.)
title_full_unstemmed Constructive side-channel analysis and secure design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers Sylvain Guilley (Ed.)
title_short Constructive side-channel analysis and secure design
title_sort constructive side channel analysis and secure design 8th international workshop cosade 2017 paris france april 13 14 2017 revised selected papers
title_sub 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017 : revised selected papers
topic Computer science
Microprogramming
Architecture, Computer
Computer security
Data encryption (Computer science)
Computer science / Mathematics
Management information systems
Computer Science
Systems and Data Security
Data Encryption
Management of Computing and Information Systems
Computer System Implementation
Discrete Mathematics in Computer Science
Control Structures and Microprogramming
Informatik
Mathematik
Differentielle Kryptoanalyse (DE-588)4367918-3 gnd
Kryptosystem (DE-588)4209132-9 gnd
Seitenkanalattacke (DE-588)7546808-6 gnd
Hardwareentwurf (DE-588)4159103-3 gnd
Fehleranalyse (DE-588)4016608-9 gnd
Implementierung Informatik (DE-588)4026663-1 gnd
topic_facet Computer science
Microprogramming
Architecture, Computer
Computer security
Data encryption (Computer science)
Computer science / Mathematics
Management information systems
Computer Science
Systems and Data Security
Data Encryption
Management of Computing and Information Systems
Computer System Implementation
Discrete Mathematics in Computer Science
Control Structures and Microprogramming
Informatik
Mathematik
Differentielle Kryptoanalyse
Kryptosystem
Seitenkanalattacke
Hardwareentwurf
Fehleranalyse
Implementierung Informatik
Konferenzschrift
url https://doi.org/10.1007/978-3-319-64647-3
volume_link (DE-604)BV014880109
work_keys_str_mv AT cosadeparis constructivesidechannelanalysisandsecuredesign8thinternationalworkshopcosade2017parisfranceapril13142017revisedselectedpapers
AT guilleysylvain constructivesidechannelanalysisandsecuredesign8thinternationalworkshopcosade2017parisfranceapril13142017revisedselectedpapers