My Account Log in

1 option

Security, Privacy, and Applied Cryptography Engineering : 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings / edited by Lejla Batina, Stjepan Picek, Mainack Mondal.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Author/Creator:
Batina, Lejla.
Contributor:
Picek, Stjepan.
Mondal, Mainack.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 13783
Language:
English
Subjects (All):
Data protection.
Computer engineering.
Computer networks.
Cryptography.
Data encryption (Computer science).
Data and Information Security.
Computer Engineering and Networks.
Cryptology.
Local Subjects:
Data and Information Security.
Computer Engineering and Networks.
Cryptology.
Physical Description:
1 online resource (346 pages)
Edition:
1st ed. 2022.
Place of Publication:
Cham : Springer Nature Switzerland : Imprint: Springer, 2022.
Summary:
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9–12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
Contents:
Symmetric Cryptography
Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128
Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers
Hardware Implementation of Masked SKINNY SBox with Application to AEAD
Bias Cancellation of MixColumns
Big Brother Is Watching You: A Closer Look At Backdoor Construction
Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs
KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems
Protecting the most significant bits in scalar multiplication algorithms
Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields
Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view
Hardware Security and AI
What Do You See? Transforming Fault Injection Target Characterizations
Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log
Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs
HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation
How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles
Network security, Authentication, and Privacy
SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology
An analysis of the hardware-friendliness of AMQ data structures for network security
RemOD: Operational Drift-adaptive Intrusion Detection
A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.
Other Format:
Print version: Batina, Lejla Security, Privacy, and Applied Cryptography Engineering
ISBN:
3-031-22829-4

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account