Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : Revised Selected Papers
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Berlin ; Heidelberg ; New York ; Dordrecht ; London
Springer
[2014]
|
Schriftenreihe: | Lecture Notes in Computer Science
8424 |
Schlagwörter: | |
Links: | https://doi.org/10.1007/978-3-662-43933-3 https://doi.org/10.1007/978-3-662-43933-3 https://doi.org/10.1007/978-3-662-43933-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632587&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632587&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | 1 Online Ressource (XIII, 605 p. 135 illus) |
ISBN: | 9783662439333 9783662439326 |
DOI: | 10.1007/978-3-662-43933-3 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV043209426 | ||
003 | DE-604 | ||
005 | 20160525 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2014 xx o|||| 10||| eng d | ||
020 | |a 9783662439333 |c Online |9 978-3-662-43933-3 | ||
020 | |a 9783662439326 |c Print |9 978-3-662-43932-6 | ||
024 | 7 | |a 10.1007/978-3-662-43933-3 |2 doi | |
035 | |a (OCoLC)885799074 | ||
035 | |a (DE-599)BVBBV043209426 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-384 |a DE-522 |a DE-Aug4 |a DE-861 |a DE-M347 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Fast Software Encryption |b 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : Revised Selected Papers |c Shiho Moriai (Ed.) |
264 | 1 | |a Berlin ; Heidelberg ; New York ; Dordrecht ; London |b Springer |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 Online Ressource (XIII, 605 p. 135 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 8424 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Blockchiffre |0 (DE-588)4323693-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Stromchiffre |0 (DE-588)4271270-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Singapur |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 1 | 2 | |a Blockchiffre |0 (DE-588)4323693-5 |D s |
689 | 1 | 3 | |a Stromchiffre |0 (DE-588)4271270-1 |D s |
689 | 1 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 2 | 2 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 2 | 3 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
700 | 1 | |a Moriai, Shiho |0 (DE-588)1056925515 |4 edt | |
711 | 2 | |a FSE |n 20 |d 2013 |c Singapur |0 (DE-588)1054874867 |4 isb | |
830 | 0 | |a Lecture Notes in Computer Science |v 8424 |w (DE-604)BV014880109 |9 8424 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-43933-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632587&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632587&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2014 | |
940 | 1 | |q ZDB-2-LNC_2014 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028632587 | |
966 | e | |u https://doi.org/10.1007/978-3-662-43933-3 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-43933-3 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2159917 |
---|---|
_version_ | 1821935037723967488 |
adam_text |
FAST SOFTWARE ENCRYPTION
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
BLOCK CIPHERS
LIGHTWEIGHT BLOCK CIPHERS
TWEAKABLE BLOCK CIPHERS
STREAM CIPHERS
HASH FUNCTIONS
MESSAGE AUTHENTICATION CODES
PROVABLE SECURITY
IMPLEMENTATION ASPECTS
LIGHTWEIGHT AUTHENTICATED ENCRYPTION
BOOLEAN FUNCTIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
FAST SOFTWARE ENCRYPTION
/
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE
PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON FAST SOFTWARE
ENCRYPTION, HELD IN SINGAPORE, MARCH 11-13, 2013. THE 30 REVISED FULL
PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM 97 INITIAL
SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON BLOCK
CIPHERS, LIGHTWEIGHT BLOCK CIPHERS, TWEAKABLE BLOCK CIPHERS, STREAM
CIPHERS, HASH FUNCTIONS, MESSAGE AUTHENTICATION CODES, PROVABLE
SECURITY, IMPLEMENTATION ASPECTS, LIGHTWEIGHT AUTHENTICATED ENCRYPTION,
AUTOMATED CRYPTANALYSIS, BOOLEAN FUNCTIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author2 | Moriai, Shiho |
author2_role | edt |
author2_variant | s m sm |
author_GND | (DE-588)1056925515 |
author_facet | Moriai, Shiho |
building | Verbundindex |
bvnumber | BV043209426 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)885799074 (DE-599)BVBBV043209426 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-43933-3 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV043209426</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160525</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2014 xx o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662439333</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-43933-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662439326</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-43932-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-43933-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)885799074</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209426</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fast Software Encryption</subfield><subfield code="b">20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : Revised Selected Papers</subfield><subfield code="c">Shiho Moriai (Ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York ; Dordrecht ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XIII, 605 p. 135 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8424</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Stromchiffre</subfield><subfield code="0">(DE-588)4271270-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Singapur</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Stromchiffre</subfield><subfield code="0">(DE-588)4271270-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Moriai, Shiho</subfield><subfield code="0">(DE-588)1056925515</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">FSE</subfield><subfield code="n">20</subfield><subfield code="d">2013</subfield><subfield code="c">Singapur</subfield><subfield code="0">(DE-588)1054874867</subfield><subfield code="4">isb</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8424</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8424</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-43933-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632587&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632587&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2014</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2014</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632587</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43933-3</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-43933-3</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Singapur gnd-content |
genre_facet | Konferenzschrift 2013 Singapur |
id | DE-604.BV043209426 |
illustrated | Not Illustrated |
indexdate | 2025-01-11T19:08:05Z |
institution | BVB |
institution_GND | (DE-588)1054874867 |
isbn | 9783662439333 9783662439326 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632587 |
oclc_num | 885799074 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-384 DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-384 DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online Ressource (XIII, 605 p. 135 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2014 ZDB-2-LNC_2014 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spellingShingle | Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : Revised Selected Papers Lecture Notes in Computer Science Computer science Computer security Data encryption (Computer science) Coding theory Management information systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Coding and Information Theory Informatik Authentifikation (DE-588)4330656-1 gnd Blockchiffre (DE-588)4323693-5 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Software (DE-588)4055382-6 gnd Stromchiffre (DE-588)4271270-1 gnd Kryptologie (DE-588)4033329-2 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
subject_GND | (DE-588)4330656-1 (DE-588)4323693-5 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4055382-6 (DE-588)4271270-1 (DE-588)4033329-2 (DE-588)4323071-4 (DE-588)1071861417 |
title | Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : Revised Selected Papers |
title_auth | Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : Revised Selected Papers |
title_exact_search | Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : Revised Selected Papers |
title_full | Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : Revised Selected Papers Shiho Moriai (Ed.) |
title_fullStr | Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : Revised Selected Papers Shiho Moriai (Ed.) |
title_full_unstemmed | Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : Revised Selected Papers Shiho Moriai (Ed.) |
title_short | Fast Software Encryption |
title_sort | fast software encryption 20th international workshop fse 2013 singapore march 11 13 2013 revised selected papers |
title_sub | 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013 : Revised Selected Papers |
topic | Computer science Computer security Data encryption (Computer science) Coding theory Management information systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Coding and Information Theory Informatik Authentifikation (DE-588)4330656-1 gnd Blockchiffre (DE-588)4323693-5 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Software (DE-588)4055382-6 gnd Stromchiffre (DE-588)4271270-1 gnd Kryptologie (DE-588)4033329-2 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
topic_facet | Computer science Computer security Data encryption (Computer science) Coding theory Management information systems Computer Science Data Encryption Systems and Data Security Management of Computing and Information Systems Coding and Information Theory Informatik Authentifikation Blockchiffre Kryptosystem Kryptoanalyse Software Stromchiffre Kryptologie Hash-Algorithmus Konferenzschrift 2013 Singapur |
url | https://doi.org/10.1007/978-3-662-43933-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632587&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632587&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT moriaishiho fastsoftwareencryption20thinternationalworkshopfse2013singaporemarch11132013revisedselectedpapers AT fsesingapur fastsoftwareencryption20thinternationalworkshopfse2013singaporemarch11132013revisedselectedpapers |