My Account Log in

1 option

Security, Privacy, and Applied Cryptography Engineering : 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings / edited by Lejla Batina, Stjepan Picek, Mainack Mondal.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Batina, Lejla, Editor.
Picek, Stjepan, Editor.
Mondal, Mainack, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 13162
Security and Cryptology ; 13162
Language:
English
Subjects (All):
Data protection.
Computer engineering.
Computer networks.
Image processing-Digital techniques.
Computer vision.
Data and Information Security.
Computer Engineering and Networks.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Local Subjects:
Data and Information Security.
Computer Engineering and Networks.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Physical Description:
1 online resource (IX, 263 pages) : 62 illustrations, 43 illustrations in color.
Edition:
1st ed. 2022.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2022.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2021, held in Kolkata, India, in December 2021. The 13 full papers presented were carefully reviewed and selected from 42 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.
Contents:
Symmetric Cryptography
Computing the Distribution of Differentials over the Non-linear Mapping
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
LP Based Differential Attack on Round Reduced WARP
Post-quantum cryptography and homomorphic encryption
SHELBRS: Location-Based Recommendation Services using Switchable Homomorphic Encryption
On Threat of Hardware Trojan To Post-Quantum Lattice-based Schemes: A Key Recovery Attack on SABER and beyond
Safe-Error Attacks on SIKE and CSIDH
Hardware security and side-channel attacks
Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV
Parasite: Mitigating Physical Side-channel Attacks against Neural Networks
Reinforcement Learning-based Design of Side-channel Countermeasures
Deep Freezing Attacks on Capacitors and Electronic Circuits
AI and Cloud security
Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database
Robustness Against Adversarial Attacks using Dimensionality
SoK - Network Intrusion Detection on FPGA.
Other Format:
Printed edition:
ISBN:
978-3-030-95085-9
9783030950859
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account