語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security, privacy, and applied crypt...
~
SPACE (Conference : Applied cryptography engineering) (2022 :)
FindBook
Google Book
Amazon
博客來
Security, privacy, and applied cryptography engineering = 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Security, privacy, and applied cryptography engineering/ edited by Lejla Batina, Stjepan Picek, Mainack Mondal.
其他題名:
12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022 : proceedings /
其他題名:
SPACE 2022
其他作者:
Batina, Lejla.
團體作者:
SPACE (Conference : Applied cryptography engineering)
出版者:
Cham :Springer Nature Switzerland : : 2022.,
面頁冊數:
x, 343 p. :ill. (some col.), digital ;24 cm.
內容註:
Symmetric Cryptography -- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 -- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers -- Hardware Implementation of Masked SKINNY SBox with Application to AEAD -- Bias Cancellation of MixColumns -- Big Brother Is Watching You: A Closer Look At Backdoor Construction -- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs -- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems -- Protecting the most significant bits in scalar multiplication algorithms -- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields -- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view -- Hardware Security and AI -- What Do You See? Transforming Fault Injection Target Characterizations -- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log -- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs -- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation -- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles -- Network security, Authentication, and Privacy -- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology -- An analysis of the hardware-friendliness of AMQ data structures for network security -- RemOD: Operational Drift-adaptive Intrusion Detection -- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.
Contained By:
Springer Nature eBook
標題:
Data encryption (Computer science) - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-22829-2
ISBN:
9783031228292
Security, privacy, and applied cryptography engineering = 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022 : proceedings /
Security, privacy, and applied cryptography engineering
12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022 : proceedings /[electronic resource] :SPACE 2022edited by Lejla Batina, Stjepan Picek, Mainack Mondal. - Cham :Springer Nature Switzerland :2022. - x, 343 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,137830302-9743 ;. - Lecture notes in computer science ;13783..
Symmetric Cryptography -- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 -- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers -- Hardware Implementation of Masked SKINNY SBox with Application to AEAD -- Bias Cancellation of MixColumns -- Big Brother Is Watching You: A Closer Look At Backdoor Construction -- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs -- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems -- Protecting the most significant bits in scalar multiplication algorithms -- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields -- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view -- Hardware Security and AI -- What Do You See? Transforming Fault Injection Target Characterizations -- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log -- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs -- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation -- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles -- Network security, Authentication, and Privacy -- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology -- An analysis of the hardware-friendliness of AMQ data structures for network security -- RemOD: Operational Drift-adaptive Intrusion Detection -- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
ISBN: 9783031228292
Standard No.: 10.1007/978-3-031-22829-2doiSubjects--Topical Terms:
844473
Data encryption (Computer science)
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security, privacy, and applied cryptography engineering = 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022 : proceedings /
LDR
:03574nmm a2200373 a 4500
001
2306801
003
DE-He213
005
20221206093734.0
006
m d
007
cr nn 008maaau
008
230421s2022 sz s 0 eng d
020
$a
9783031228292
$q
(electronic bk.)
020
$a
9783031228285
$q
(paper)
024
7
$a
10.1007/978-3-031-22829-2
$2
doi
035
$a
978-3-031-22829-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S446 2022
111
2
$a
SPACE (Conference : Applied cryptography engineering)
$n
(12th :
$d
2022 :
$c
Jaipur, India)
$3
3611371
245
1 0
$a
Security, privacy, and applied cryptography engineering
$h
[electronic resource] :
$b
12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022 : proceedings /
$c
edited by Lejla Batina, Stjepan Picek, Mainack Mondal.
246
3
$a
SPACE 2022
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2022.
300
$a
x, 343 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13783
505
0
$a
Symmetric Cryptography -- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 -- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers -- Hardware Implementation of Masked SKINNY SBox with Application to AEAD -- Bias Cancellation of MixColumns -- Big Brother Is Watching You: A Closer Look At Backdoor Construction -- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs -- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems -- Protecting the most significant bits in scalar multiplication algorithms -- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields -- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view -- Hardware Security and AI -- What Do You See? Transforming Fault Injection Target Characterizations -- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log -- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs -- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation -- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles -- Network security, Authentication, and Privacy -- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology -- An analysis of the hardware-friendliness of AMQ data structures for network security -- RemOD: Operational Drift-adaptive Intrusion Detection -- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.
520
$a
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computer organization.
$3
567589
650
0
$a
Computers.
$3
544777
650
0
$a
Coding theory.
$3
532585
650
0
$a
Information theory.
$3
542527
700
1
$a
Batina, Lejla.
$3
2106877
700
1
$a
Picek, Stjepan.
$3
3528772
700
1
$a
Mondal, Mainack.
$3
3528773
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13783.
$3
3611372
856
4 0
$u
https://doi.org/10.1007/978-3-031-22829-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9447761
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入