My Account Log in

1 option

Lightweight Cryptography for Security and Privacy : Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers / edited by Thomas Eisenbarth, Erdinç Öztürk.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Eisenbarth, Thomas, Editor.
Öztürk, Erdinç, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 8898
Security and Cryptology ; 8898
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks.
Algorithms.
Cryptology.
Data and Information Security.
Computer Communication Networks.
Local Subjects:
Cryptology.
Data and Information Security.
Computer Communication Networks.
Algorithms.
Physical Description:
1 online resource (XIII, 169 pages) : 33 illustrations
Edition:
1st ed. 2015.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2015.
System Details:
text file PDF
Summary:
This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: efficient implementations and designs; attacks; and protocols.
Contents:
The SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers
The Multiplicative Complexity of Boolean Functions on Four and Five Variables
A Flexible and Compact Hardware Architecture for the SIMON Block Cipher
AES Smaller Than S-Box: Minimalism in Software Design on Low End Microcontrollers
Differential Factors: Improved Attacks on SERPENT
Ciphertext-Only Fault Attacks on PRESENT
Relating Undisturbed Bits to Other Properties of Substitution Boxes
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity.
Other Format:
Printed edition:
ISBN:
978-3-319-16363-5
9783319163635
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account