|
![]() |
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2021, held in Kolkata, India, in December 2021. The 13 full papers presented were carefully reviewed and selected from 42 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design. Full Product DetailsAuthor: Lejla Batina , Stjepan Picek , Mainack MondalPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Edition: 1st ed. 2022 Volume: 13162 Weight: 0.427kg ISBN: 9783030950842ISBN 10: 3030950840 Pages: 263 Publication Date: 29 January 2022 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsSymmetric Cryptography.- Computing the Distribution of Differentials over the Non-linear Mapping .- Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security.- LP Based Differential Attack on Round Reduced WARP.- Post-quantum cryptography and homomorphic encryption.- SHELBRS: Location-Based Recommendation Services using Switchable Homomorphic Encryption.- On Threat of Hardware Trojan To Post-Quantum Lattice-based Schemes: A Key Recovery Attack on SABER and beyond.- Safe-Error Attacks on SIKE and CSIDH.- Hardware security and side-channel attacks.- Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV.- Parasite: Mitigating Physical Side-channel Attacks against Neural Networks.- Reinforcement Learning-based Design of Side-channel Countermeasures.- Deep Freezing Attacks on Capacitors and Electronic Circuits.- AI and Cloud security.- Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database .- RobustnessAgainst Adversarial Attacks using Dimensionality.- SoK - Network Intrusion Detection on FPGA.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |