Atjaunināt sīkdatņu piekrišanu

E-grāmata: Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings

Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13783
  • Izdošanas datums: 06-Dec-2022
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031228292
  • Formāts - EPUB+DRM
  • Cena: 77,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13783
  • Izdošanas datums: 06-Dec-2022
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031228292

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9–12, 2022.

The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.

Symmetric Cryptography.- Modeling Large S-box in MILP and a
(Related-key) Differential Attack on Full Round PIPO-64/128.- Light but
Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers
for Strong Ciphers.- Hardware Implementation of Masked SKINNY SBox with
Application to AEAD.- Bias Cancellation of MixColumns.- Big Brother Is
Watching You: A Closer Look At Backdoor Construction.- Public-key
Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs.- KEMTLS vs.
Post-Quantum TLS: Performance on Embedded Systems.- Protecting the most
significant bits in scalar multiplication algorithms.- Combining Montgomery
Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime
Order Fields.- Card-based zero-knowledge proof for the nearest neighbor
property: Zero-knowledge proof of ABC end view.- Hardware Security and
AI.- What Do You See? Transforming Fault Injection Target
Characterizations.- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel
Attack to Retrieve Dialled Call Log.- Machine Learning Attacks on Low-Cost
Reconfigurable XRRO and XRBR PUF Designs.- HWGN2: Side-channel Protected NNs
through Secure and Private Function Evaluation.- How Many Cameras Do You
Need? Adversarial Attacks and Countermeasures for Robust Perception in
Autonomous Vehicles.- Network security, Authentication, and Privacy.- SMarT:
A SMT based Privacy Preserving Smart Meter Streaming Methodology.- An
analysis of the hardware-friendliness of AMQ data structures for network
security.- RemOD: Operational Drift-adaptive Intrusion Detection.- A short
note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication
System with Template Protection using Topology Code for local registration
and security enhancement.