Batina / Mondal / Picek | Security, Privacy, and Applied Cryptography Engineering | Buch | 978-3-030-66625-5 | sack.de

Buch, Englisch, Band 12586, 259 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 417 g

Reihe: Lecture Notes in Computer Science

Batina / Mondal / Picek

Security, Privacy, and Applied Cryptography Engineering

10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings
1. Auflage 2020
ISBN: 978-3-030-66625-5
Verlag: Springer International Publishing

10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings

Buch, Englisch, Band 12586, 259 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 417 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-030-66625-5
Verlag: Springer International Publishing


This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual.
The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.


Batina / Mondal / Picek Security, Privacy, and Applied Cryptography Engineering jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


tPAKE: Typo-Tolerant Password-Authenticated Key Exchange.- PAS-TA-U: PASsword-based Threshold Authentication with Password Update.- Re-Markable: Stealing Watermarked Neural Networks through Synthesis.- Robust Adaptive Cloud Intrusion Detection System using Advanced Deep Reinforcement Learning.- A Forensic Technique to Detect Copy-Move Forgery based on Image Statistics.- ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit Permutation based ciphers with a case study on GIFT.- On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT.- HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption.- Fiat-Shamir with Aborts: From Identification Schemes to Linkable Ring Signatures.- An Insecurity Study of Ethereum Smart Contracts.- Cryptographically Secure Multi-Tenant Provisioning of FPGAs.- Experimental results on higher-order differential spectra of 6 and 8-bit invertible S-boxes.- Quantum Resource Estimates of Grover’sKey Search on ARIA.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.