Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings

Author:   Lejla Batina ,  Stjepan Picek ,  Mainack Mondal
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2022
Volume:   13783
ISBN:  

9783031228285


Pages:   343
Publication Date:   07 December 2022
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $168.16 Quantity:  
Add to Cart

Share |

Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Lejla Batina ,  Stjepan Picek ,  Mainack Mondal
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2022
Volume:   13783
Weight:   0.545kg
ISBN:  

9783031228285


ISBN 10:   3031228286
Pages:   343
Publication Date:   07 December 2022
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Symmetric Cryptography.- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128.- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers.- Hardware Implementation of Masked SKINNY SBox with Application to AEAD.- Bias Cancellation of MixColumns.- Big Brother Is Watching You: A Closer Look At Backdoor Construction.- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs.- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems.- Protecting the most significant bits in scalar multiplication algorithms.- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields.- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view.- Hardware Security and AI.- What Do You See? Transforming Fault Injection Target Characterizations.- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log.- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs.- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation.- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles.- Network security, Authentication, and Privacy.- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology.- An analysis of the hardware-friendliness of AMQ data structures for network security.- RemOD: Operational Drift-adaptive Intrusion Detection.- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List