Muutke küpsiste eelistusi

Security, Privacy, and Applied Cryptography Engineering: 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings 1st ed. 2018 [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 219 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 42 Illustrations, color; 27 Illustrations, black and white; XXX, 219 p. 69 illus., 42 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 11348
  • Ilmumisaeg: 07-Dec-2018
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030050718
  • ISBN-13: 9783030050719
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 219 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 42 Illustrations, color; 27 Illustrations, black and white; XXX, 219 p. 69 illus., 42 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 11348
  • Ilmumisaeg: 07-Dec-2018
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030050718
  • ISBN-13: 9783030050719

This book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018.
The 12 full papers presented together with 5 short paper, were carefully reviewed and selected from 34 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

An Observation of Non-randomness in the Grain Family of Stream Ciphers with Reduced Initialization Round
1(20)
Deepak Kumar Dalai
Dibyendu Roy
Template-Based Fault Injection Analysis of Block Ciphers
21(16)
Ashrujit Ghoshal
Sikhar Patranabis
Debdeep Mukhopadhyay
NEON SIKE: Supersingular Isogeny Key Encapsulation on ARMv7
37(15)
Amir Jalali
Reza Azarderakhsh
Mehran Mozaffari Kermani
A Machine Vision Attack Model on Image Based CAPTCHAs Challenge: Large Scale Evaluation
52(13)
Ajeet Singh
Vikas Tiwari
Appala Naidu Tentu
Addressing Side-Channel Vulnerabilities in the Discrete Ziggurat Sampler
65(20)
Seamus Brannigan
Mdire O'Neill
Ayesha Khalid
Ciara Rafferty
Secure Realization of Lightweight Block Cipher: A Case Study Using GIFT
85(19)
Varsha Satheesh
Dillibabu Shanmugam
Exploiting Security Vulnerabilities in Intermittent Computing
104(21)
Archanaa S. Krishnan
Patrick Schaumont
EdSIDH: Supersingular Isogeny Diffie-Hellman Key Exchange on Edwards Curves
125(17)
Reza Azarderakhsh
Elena Bakos Lang
David Jao
Brian Koziel
Correlation Power Analysis on KASUMI: Attack and Countermeasure
142(15)
Devansh Gupta
Somanath Tripathy
Bodhisatwa Mazumdar
On the Performance of Convolutional Neural Networks for Side-Channel Analysis
157(20)
Stjepan Picek
Loannis Petros Samiotis
Jaehun Kim
Annelie Heuser
Shivam Bhasin
Axel Legay
Differential Fault Attack on SKINNY Block Cipher
177(21)
Navid Vafaei
Nasour Bagheri
Sayandeep Saha
Debdeep Mukhopadhyay
d-MUL: Optimizing and Implementing a Multidimensional Scalar Multiplication Algorithm over Elliptic Curves
198(21)
Huseyin Hisil
Aaron Hutchinson
Koray Karabina
Author Index 219