Muutke küpsiste eelistusi

E-raamat: Security, Privacy, and Applied Cryptography Engineering: 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings

Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018.
The 12 full papers presented together with 5 short paper, were carefully reviewed and selected from 34 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

An Observation of Non-randomness in the Grain Family of Stream Ciphers with Reduced Initialization Round
1(20)
Deepak Kumar Dalai
Dibyendu Roy
Template-Based Fault Injection Analysis of Block Ciphers
21(16)
Ashrujit Ghoshal
Sikhar Patranabis
Debdeep Mukhopadhyay
NEON SIKE: Supersingular Isogeny Key Encapsulation on ARMv7
37(15)
Amir Jalali
Reza Azarderakhsh
Mehran Mozaffari Kermani
A Machine Vision Attack Model on Image Based CAPTCHAs Challenge: Large Scale Evaluation
52(13)
Ajeet Singh
Vikas Tiwari
Appala Naidu Tentu
Addressing Side-Channel Vulnerabilities in the Discrete Ziggurat Sampler
65(20)
Seamus Brannigan
Mdire O'Neill
Ayesha Khalid
Ciara Rafferty
Secure Realization of Lightweight Block Cipher: A Case Study Using GIFT
85(19)
Varsha Satheesh
Dillibabu Shanmugam
Exploiting Security Vulnerabilities in Intermittent Computing
104(21)
Archanaa S. Krishnan
Patrick Schaumont
EdSIDH: Supersingular Isogeny Diffie-Hellman Key Exchange on Edwards Curves
125(17)
Reza Azarderakhsh
Elena Bakos Lang
David Jao
Brian Koziel
Correlation Power Analysis on KASUMI: Attack and Countermeasure
142(15)
Devansh Gupta
Somanath Tripathy
Bodhisatwa Mazumdar
On the Performance of Convolutional Neural Networks for Side-Channel Analysis
157(20)
Stjepan Picek
Loannis Petros Samiotis
Jaehun Kim
Annelie Heuser
Shivam Bhasin
Axel Legay
Differential Fault Attack on SKINNY Block Cipher
177(21)
Navid Vafaei
Nasour Bagheri
Sayandeep Saha
Debdeep Mukhopadhyay
d-MUL: Optimizing and Implementing a Multidimensional Scalar Multiplication Algorithm over Elliptic Curves
198(21)
Huseyin Hisil
Aaron Hutchinson
Koray Karabina
Author Index 219