Karfa / Asadi / Chattopadhyay | Security, Privacy, and Applied Cryptography Engineering | Buch | 978-3-032-16341-7 | www.sack.de

Buch, Englisch, 432 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 674 g

Reihe: Lecture Notes in Computer Science

Karfa / Asadi / Chattopadhyay

Security, Privacy, and Applied Cryptography Engineering

15th International Conference, SPACE 2025, Guwahati, India, December 16-19, 2025, Proceedings
Erscheinungsjahr 2026
ISBN: 978-3-032-16341-7
Verlag: Springer

15th International Conference, SPACE 2025, Guwahati, India, December 16-19, 2025, Proceedings

Buch, Englisch, 432 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 674 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-032-16341-7
Verlag: Springer


This book constitutes the proceedings of the 15th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2025, held in Guwahati, India, during December 16–19, 2025.

The 22 full papers included in this book were carefully reviewed and selected from 103 submissions.They focus on various aspects of security, privacy, applied cryptography, and cryptographic engineering offering valuable insights and innovative solutions toward a better, more secure digital world.

Karfa / Asadi / Chattopadhyay Security, Privacy, and Applied Cryptography Engineering jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- A Custom Entropy Harvester for Consistent Entropy Supply to the /dev/random.
.- Efficient Time Share Masking of AES.
.- Investigation on the Impact of Practical Fault Model for Commercial Edge Machine Learning Devices.
.- A new perspective on the decomposition in the Jacobian of small genus hyperelliptic curve.
.- A Multi-View Contrastive Graph Neural Network Framework for Malware Detection in IoMT environments.
.-  PAC-Guided Design Strategies for Resilient Priority Arbiter PUFs.
.-  Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection.
.- GhostWriter: Exploiting GPU-Cache Contention to Steal and Steer Multi-Tenant Large-Language-Model Inference.
.-  Breaking PCB-Chain: A Side Channel Assisted Attack on IoT-Friendly Blockchain Mining.
.- Analyzing Non-linear Shift Register Transformations in the Design and Cryptanalysis of Espresso.
.-  Sample Similarity based Incremental Clustering: An Effective Methodology for Anomaly Detection in Networks .
.- Addressing Cache Side-Channel Attacks using Taint-guidedFine-grained Computation Offloading in Near-Memory Processing.
.-  Gradient-Guided Adversarial Patch Attack for Deep Neural Networks.
.-  High throughput 64-bit implementation of SNOW-V stream cipher.
.- A Security Analysis of CNN Partitioning Strategies for Distributed Inference at the Edge.
.-  MLP is better than ResNet on ANSSI’s Protected AES Implementation on ARM.
.- VulScan-LT: A Lightweight Transformer-based Software VulnerabilityScanning Tool for Resource-Constrained Edge Devices.
.- Enhanced Hardware Trojan Detection with XGBoost Graph Learning:A Glass Box Approach.
.- Hard-to-Find Bugs in Public-Key Cryptographic Software:Classification and Test Methodologies.
.- Secure Secret Sharing Protocol Against Network Data Remanence Side Channel Attacks.
.-  Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization.
.-  A keystream generator inspired by the experiment of drawing balls with replacement.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.