Security, Privacy, and Applied Cryptography Engineering: 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings

Author:   Shivam Bhasin ,  Avi Mendelson ,  Mridul Nandi
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2019
Volume:   11947
ISBN:  

9783030358686


Pages:   237
Publication Date:   21 November 2019
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Security, Privacy, and Applied Cryptography Engineering: 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 9th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2019, held in Gandhinagar, India, in December 2019. The 12 full papers presented were carefully reviewed and selected from 24 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Full Product Details

Author:   Shivam Bhasin ,  Avi Mendelson ,  Mridul Nandi
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2019
Volume:   11947
Weight:   0.454kg
ISBN:  

9783030358686


ISBN 10:   3030358682
Pages:   237
Publication Date:   21 November 2019
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security.- Real Processing-in-Memory with Memristive Memory Processing Unit.- Length Preserving Symmetric Encryption: Is it Important?.- Towards Automatic Application of Side Channel Countermeasures.- Challenges in Deep Learning-based Profiled Side-channel Analysis.- A Study of Persistent Fault Analysis.- Internal state recovery attack on Stream Ciphers : Breaking BIVIUM.- Related-key Differential Cryptanalysis of Full Round CRAFT.- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security.- One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA.- An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128.- Automated Classification of Web-Application Attacks for Intrusion Detection.- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions.- ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch.- Encrypted Classification Using Secure K-Nearest Neighbour Computation.- A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices.- Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List