Editors:
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8898)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): LightSec: International Workshop on Lightweight Cryptography for Security and Privacy
Conference proceedings info: LightSec 2014.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (10 papers)
-
Front Matter
-
Attacks
-
Front Matter
-
-
Protocols
-
Front Matter
-
-
Back Matter
About this book
Keywords
- Authentication
- Boolean functions
- Circuit complexity
- Cryptanalysis
- Cryptographic algorithms
- Differential-linear attack
- FPGA
- Lightweight block cipher
- Match box
- Meet-in-the-middle attack
- Multiplicative complexity
- Provable security
- RFID
- S-box
- SIMON
- Serpent
- Substitution box
- Wireless network security
- algorithm analysis and problem complexity
Editors and Affiliations
-
Worcester Polytechnic Institute, Worcester, USA
Thomas Eisenbarth
-
Istanbul Commerce University, Istanbul, Turkey
Erdinç Öztürk
Bibliographic Information
Book Title: Lightweight Cryptography for Security and Privacy
Book Subtitle: Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers
Editors: Thomas Eisenbarth, Erdinç Öztürk
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-16363-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-16362-8Published: 27 March 2015
eBook ISBN: 978-3-319-16363-5Published: 16 March 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 169
Number of Illustrations: 33 b/w illustrations
Topics: Cryptology, Systems and Data Security, Computer Communication Networks, Algorithm Analysis and Problem Complexity