000 | 04781nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-22829-2 | ||
003 | DE-He213 | ||
005 | 20240730172447.0 | ||
007 | cr nn 008mamaa | ||
008 | 221206s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031228292 _9978-3-031-22829-2 |
||
024 | 7 |
_a10.1007/978-3-031-22829-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity, Privacy, and Applied Cryptography Engineering _h[electronic resource] : _b12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings / _cedited by Lejla Batina, Stjepan Picek, Mainack Mondal. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2022. |
|
300 |
_aX, 343 p. 104 illus., 75 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13783 |
|
505 | 0 | _aSymmetric Cryptography -- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 -- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers -- Hardware Implementation of Masked SKINNY SBox with Application to AEAD -- Bias Cancellation of MixColumns -- Big Brother Is Watching You: A Closer Look At Backdoor Construction -- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs -- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems -- Protecting the most significant bits in scalar multiplication algorithms -- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields -- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view -- Hardware Security and AI -- What Do You See? Transforming Fault Injection Target Characterizations -- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log -- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs -- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation -- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles -- Network security, Authentication, and Privacy -- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology -- An analysis of the hardware-friendliness of AMQ data structures for network security -- RemOD: Operational Drift-adaptive Intrusion Detection -- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement. | |
520 | _aThis book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9103833 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9103833 |
700 | 1 |
_aBatina, Lejla. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9103835 |
|
700 | 1 |
_aPicek, Stjepan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9103836 |
|
700 | 1 |
_aMondal, Mainack. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9103838 |
|
710 | 2 |
_aSpringerLink (Online service) _9103839 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031228285 |
776 | 0 | 8 |
_iPrinted edition: _z9783031228308 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13783 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-22829-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c88317 _d88317 |