Cryptographic hardware and embedded systems -- CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20--23, 2013. Proceedings
DOI10.1007/978-3-642-40349-1zbMATH Open1269.68018OpenAlexW2495581995MaRDI QIDQ354948FDOQ354948
Authors:
Publication date: 22 July 2013
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40349-1
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Proceedings of conferences of miscellaneous specific interest (00B25) Proceedings, conferences, collections, etc. pertaining to computer science (68-06) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Cited In (6)
- Cryptographic hardware and embedded systems -- CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13--15, 2002. Revised papers
- Kummer for genus one over prime-order fields
- Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs
- Twisted Hessian curves
- Masking and leakage-resilient primitives: one, the other(s) or both?
- Hyper-and-elliptic-curve cryptography
This page was built for publication: Cryptographic hardware and embedded systems -- CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20--23, 2013. Proceedings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q354948)