Security, Privacy, and Applied Cryptography Engineering: 11th International Conference, SPACE 2021, Kolkata, India, December 10–13, 2021, Proceedings

Author:   Lejla Batina ,  Stjepan Picek ,  Mainack Mondal
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2022
Volume:   13162
ISBN:  

9783030950842


Pages:   263
Publication Date:   29 January 2022
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $142.29 Quantity:  
Add to Cart

Share |

Security, Privacy, and Applied Cryptography Engineering: 11th International Conference, SPACE 2021, Kolkata, India, December 10–13, 2021, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2021, held in Kolkata, India, in December 2021. The 13 full papers presented were carefully reviewed and selected from 42 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Full Product Details

Author:   Lejla Batina ,  Stjepan Picek ,  Mainack Mondal
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2022
Volume:   13162
Weight:   0.427kg
ISBN:  

9783030950842


ISBN 10:   3030950840
Pages:   263
Publication Date:   29 January 2022
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Symmetric Cryptography.- Computing the Distribution of Differentials over the Non-linear Mapping .- Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security.- LP Based Differential Attack on Round Reduced WARP.- Post-quantum cryptography and homomorphic encryption.- SHELBRS: Location-Based Recommendation Services using Switchable Homomorphic Encryption.- On Threat of Hardware Trojan To Post-Quantum Lattice-based Schemes: A Key Recovery Attack on SABER and beyond.- Safe-Error Attacks on SIKE and CSIDH.- Hardware security and side-channel attacks.- Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV.- Parasite: Mitigating Physical Side-channel Attacks against Neural Networks.- Reinforcement Learning-based Design of Side-channel Countermeasures.- Deep Freezing Attacks on Capacitors and Electronic Circuits.- AI and Cloud security.- Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database .- RobustnessAgainst Adversarial Attacks using Dimensionality.- SoK - Network Intrusion Detection on FPGA.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List