Narrow your search

Library

KU Leuven (3)

ULiège (3)

KBR (2)

ULB (2)

UGent (1)

UNamur (1)


Resource type

book (9)


Language

English (9)


Year
From To Submit

2007 (1)

2003 (1)

1997 (4)

1988 (1)

1977 (1)

More...
Listing 1 - 9 of 9
Sort by
Advances in cryptology - CRYPTO 97. 17th annual international cryptology conference, Santa Barbara, California, USA, August 1977. Proceedings
Author:
ISBN: 3540633847 Year: 1997 Publisher: Berlin [etc.] : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Business mathematics
Author:
ISBN: 015505631X Year: 1972 Publisher: New York (N.Y.) : Harcourt, Brace and Jovanovich,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Business mathematics
Author:
ISBN: 9780155056367 0155056360 Year: 1977 Publisher: New York (N.Y.): Harcourt, Brace and Jovanovich,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Elliptic curves and cryptography : a pseudorandom bit generator and other tools
Author:
Year: 1988 Publisher: Cambridge (Mass.): Massachusetts institute of technology. Laboratory for computer science

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Advances in Cryptology — CRYPTO '97
Authors: --- ---
Year: 1997 Publisher: Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Advances in Cryptology — CRYPTO '97
Authors: --- ---
Year: 1997 Publisher: Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Encyclopedia of business and finance
Authors: --- ---
ISBN: 0028660617 9780028660615 0028660625 0028660633 Year: 2007 Publisher: New York, NY Detroit [etc.] Macmillan Reference USA Thomson Gale

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Advances in Cryptology — CRYPTO '97
Authors: --- ---
Year: 1997 Publisher: Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Cryptographic Hardware and Embedded Systems - CHES 2002 : 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers
Authors: --- --- ---
ISBN: 3540004092 3540364005 Year: 2003 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ThesearetheproceedingsofCHES2002,theFourthWorkshoponCryptographic Hardware and Embedded Systems. After the ?rst two CHES Workshops held in Massachusetts, and the third held in Europe, this is the ?rst Workshop on the West Coast of the United States. There was a record number of submissions this year and in response the technical program was extended to 3 days. As is evident by the papers in these proceedings, there have been again many excellent submissions. Selecting the papers for this year’s CHES was not an easy task, and we regret that we could not accept many contributions due to the limited availability of time. There were 101 submissions this year, of which 39 were selected for presentation. We continue to observe a steady increase over previous years: 42 submissions at CHES ’99, 51 at CHES 2000, and 66 at CHES 2001. We interpret this as a continuing need for a workshop series that c- bines theory and practice for integrating strong security features into modern communicationsandcomputerapplications. Inadditiontothesubmittedcont- butions, Jean-Jacques Quisquater (UCL, Belgium), Sanjay Sarma (MIT, USA) and a panel of experts on hardware random number generation gave invited talks. As in the previous years, the focus of the Workshop is on all aspects of cr- tographic hardware and embedded system security. Of special interest were c- tributionsthatdescribenewmethodsfore?cienthardwareimplementationsand high-speed software for embedded systems, e. g. , smart cards, microprocessors, DSPs, etc. CHES also continues to be an important forum for new theoretical and practical ?ndings in the important and growing ?eld of side-channel attacks.

Keywords

Embedded computer systems --- Computer security --- Cryptography --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Operating Systems. --- Discrete Mathematics in Computer Science. --- Management of Computing and Information Systems. --- Mathematics. --- Software engineering. --- Computational complexity. --- Information Systems. --- Cryptology. --- Complexity, Computational --- Electronic data processing --- Machine theory --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Operating systems --- Computer science—Mathematics. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication systems --- Distributed processing

Listing 1 - 9 of 9
Sort by