1 option
Security, Privacy, and Applied Cryptography Engineering : 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings / edited by Lejla Batina, Stjepan Picek, Mainack Mondal.
- Format:
- Book
- Series:
- Computer Science (SpringerNature-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 13162
- Security and Cryptology ; 13162
- Language:
- English
- Subjects (All):
- Data protection.
- Computer engineering.
- Computer networks.
- Image processing-Digital techniques.
- Computer vision.
- Data and Information Security.
- Computer Engineering and Networks.
- Computer Imaging, Vision, Pattern Recognition and Graphics.
- Local Subjects:
- Data and Information Security.
- Computer Engineering and Networks.
- Computer Imaging, Vision, Pattern Recognition and Graphics.
- Physical Description:
- 1 online resource (IX, 263 pages) : 62 illustrations, 43 illustrations in color.
- Edition:
- 1st ed. 2022.
- Contained In:
- Springer Nature eBook
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2022.
- System Details:
- text file PDF
- Summary:
- This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2021, held in Kolkata, India, in December 2021. The 13 full papers presented were carefully reviewed and selected from 42 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.
- Contents:
- Symmetric Cryptography
- Computing the Distribution of Differentials over the Non-linear Mapping
- Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
- LP Based Differential Attack on Round Reduced WARP
- Post-quantum cryptography and homomorphic encryption
- SHELBRS: Location-Based Recommendation Services using Switchable Homomorphic Encryption
- On Threat of Hardware Trojan To Post-Quantum Lattice-based Schemes: A Key Recovery Attack on SABER and beyond
- Safe-Error Attacks on SIKE and CSIDH
- Hardware security and side-channel attacks
- Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV
- Parasite: Mitigating Physical Side-channel Attacks against Neural Networks
- Reinforcement Learning-based Design of Side-channel Countermeasures
- Deep Freezing Attacks on Capacitors and Electronic Circuits
- AI and Cloud security
- Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database
- Robustness Against Adversarial Attacks using Dimensionality
- SoK - Network Intrusion Detection on FPGA.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-030-95085-9
- 9783030950859
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.