The third successful completion of the INDOCRYPT conference series marks the acceptance of the series by the international research community as a forum for presenting high-quality research.It also marks the coming of age of cryptology research in India. The authors for the submitted papers were spr
[Lecture Notes in Computer Science] Information Security Volume 2200 || Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
β Scribed by Davida, George I.; Frankel, Yair
- Book ID
- 121498401
- Publisher
- Springer Berlin Heidelberg
- Year
- 2001
- Tongue
- English
- Weight
- 160 KB
- Edition
- 1
- Category
- Article
- ISBN
- 354045439X
No coin nor oath required. For personal study only.
β¦ Synopsis
The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas. The conference, an outgrowth of the Information Security Workshop (ISW) series, was held in MΓ‘laga, Spain, on October 1β3, 2001. Previous workshops were ISW '97 at Ishikawa, Japan; ISW '99 at Kuala Lumpur, Malaysia; and ISW 2000 at Wollongong, Australia. The General Co chairs, Javier LΓ³pez and Eiji Okamoto, oversaw the local organization, registration, and performed many other tasks. Many individuals deserve thanks for their contribution to the success of the conference. JosΓ© M. Troya was the Conference Chair. The General Co chairs were assisted with local arrangements by Antonio MaΓ±a, Carlos Maraval, Juan J. Ortega, JosΓ© M. Sierra, and Miguel Soriano. This was the first year that the conference accepted electronic submissions. Many thanks to Dawn Gibson for assisting in developing and maintaining the electronic submission servers. The conference received 98 submissions of which 37 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. Revisions were not checked and the authors bear full responsibility for the contents of their papers. The Program Committee consisted of Elisa Bertino, UniversitΓ di Milano; G. R.
π SIMILAR VOLUMES
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4β7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized
Welcome to the Third International Conference on Information Security and Ass- ance (ISA 2009). ISA 2009 was the most comprehensive conference focused on the various aspects of advances in information security and assurance. The concept of security and assurance is emerging rapidly as an exciting ne
This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in October 2010. The 25 revised full papers and the 11 short papers presented were carefully reviewed and selected from 117 submissions. The papers are