Security, privacy, and applied crypt...
SPACE (Conference : Applied cryptography engineering) (2022 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Security, privacy, and applied cryptography engineering = 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Security, privacy, and applied cryptography engineering/ edited by Lejla Batina, Stjepan Picek, Mainack Mondal.
    Reminder of title: 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022 : proceedings /
    remainder title: SPACE 2022
    other author: Batina, Lejla.
    corporate name: SPACE (Conference : Applied cryptography engineering)
    Published: Cham :Springer Nature Switzerland : : 2022.,
    Description: x, 343 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Symmetric Cryptography -- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 -- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers -- Hardware Implementation of Masked SKINNY SBox with Application to AEAD -- Bias Cancellation of MixColumns -- Big Brother Is Watching You: A Closer Look At Backdoor Construction -- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs -- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems -- Protecting the most significant bits in scalar multiplication algorithms -- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields -- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view -- Hardware Security and AI -- What Do You See? Transforming Fault Injection Target Characterizations -- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log -- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs -- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation -- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles -- Network security, Authentication, and Privacy -- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology -- An analysis of the hardware-friendliness of AMQ data structures for network security -- RemOD: Operational Drift-adaptive Intrusion Detection -- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-22829-2
    ISBN: 9783031228292
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login