Cantitate/Preț
Produs

Security, Privacy, and Applied Cryptography Engineering: 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings: Lecture Notes in Computer Science, cartea 11947

Editat de Shivam Bhasin, Avi Mendelson, Mridul Nandi
en Limba Engleză Paperback – 21 noi 2019
This book constitutes the refereed proceedings of the 9th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2019, held in Gandhinagar, India, in December 2019. The 12 full papers presented were carefully reviewed and selected from 24 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 29136 lei

Preț vechi: 36420 lei
-20%

Puncte Express: 437

Preț estimativ în valută:
5582 6046$ 4787£

Carte tipărită la comandă

Livrare economică 06-13 mai

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030358686
ISBN-10: 3030358682
Pagini: 237
Ilustrații: X, 237 p. 106 illus., 42 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.35 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Theoretical Computer Science and General Issues

Locul publicării:Cham, Switzerland

Cuprins

Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security.- Real Processing-in-Memory with Memristive Memory Processing Unit.- Length Preserving Symmetric Encryption: Is it Important?.- Towards Automatic Application of Side Channel Countermeasures.- Challenges in Deep Learning-based Profiled Side-channel Analysis.- A Study of Persistent Fault Analysis.- Internal state recovery attack on Stream Ciphers : Breaking BIVIUM.- Related-key Differential Cryptanalysis of Full Round CRAFT.- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security.- One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA.- An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128.- Automated Classification of Web-Application Attacks for Intrusion Detection.- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions.- ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch.- Encrypted Classification Using Secure K-Nearest Neighbour Computation.- A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices.- Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.