Security, Privacy, and Applied Cryptography Engineering
12th International Conference, SPACE 2022, Jaipur, India, December 9¿12, 2022, Proceedings
Herausgegeben:Batina, Lejla; Picek, Stjepan; Mondal, Mainack
Security, Privacy, and Applied Cryptography Engineering
12th International Conference, SPACE 2022, Jaipur, India, December 9¿12, 2022, Proceedings
Herausgegeben:Batina, Lejla; Picek, Stjepan; Mondal, Mainack
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
Andere Kunden interessierten sich auch für
- Security, Privacy, and Applied Cryptography Engineering49,99 €
- Security, Privacy, and Anonymity in Computation, Communication, and Storage38,99 €
- Security, Privacy, and Anonymity in Computation, Communication, and Storage38,99 €
- Security, Privacy, and Applied Cryptography Engineering38,99 €
- Security, Privacy, and Applied Cryptography Engineering38,99 €
- Constructive Side-Channel Analysis and Secure Design74,89 €
- Security, Privacy, and Anonymity in Computation, Communication, and Storage76,99 €
-
-
-
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022.
The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 13783
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-22828-5
- 1st ed. 2022
- Seitenzahl: 356
- Erscheinungstermin: 7. Dezember 2022
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 540g
- ISBN-13: 9783031228285
- ISBN-10: 3031228286
- Artikelnr.: 66303302
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Lecture Notes in Computer Science 13783
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-22828-5
- 1st ed. 2022
- Seitenzahl: 356
- Erscheinungstermin: 7. Dezember 2022
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 540g
- ISBN-13: 9783031228285
- ISBN-10: 3031228286
- Artikelnr.: 66303302
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
Symmetric Cryptography.- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128.- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers.- Hardware Implementation of Masked SKINNY SBox with Application to AEAD.- Bias Cancellation of MixColumns.- Big Brother Is Watching You: A Closer Look At Backdoor Construction.- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs.- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems.- Protecting the most significant bits in scalar multiplication algorithms.- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields.- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view.- Hardware Security and AI.- What Do You See? Transforming Fault Injection Target Characterizations.- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log.- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs.- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation.- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles.- Network security, Authentication, and Privacy.- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology.- An analysis of the hardware-friendliness of AMQ data structures for network security.- RemOD: Operational Drift-adaptive Intrusion Detection.- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.
Symmetric Cryptography.- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128.- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers.- Hardware Implementation of Masked SKINNY SBox with Application to AEAD.- Bias Cancellation of MixColumns.- Big Brother Is Watching You: A Closer Look At Backdoor Construction.- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs.- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems.- Protecting the most significant bits in scalar multiplication algorithms.- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields.- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view.- Hardware Security and AI.- What Do You See? Transforming Fault Injection Target Characterizations.- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log.- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs.- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation.- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles.- Network security, Authentication, and Privacy.- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology.- An analysis of the hardware-friendliness of AMQ data structures for network security.- RemOD: Operational Drift-adaptive Intrusion Detection.- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.