Security, privacy, and applied cryptography engineering : 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings /: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings. (2017)
- Record Type:
- Book
- Title:
- Security, privacy, and applied cryptography engineering : 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings /: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings. (2017)
- Main Title:
- Security, privacy, and applied cryptography engineering : 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings
- Other Titles:
- SPACE 2017
- Further Information:
- Note: Edited by Sk Subidh Ali, Jean-Luc Danger, Thomas Eisenbarth.
- Editors:
- Ali, Sk Subidh
Danger, Jean-Luc
Eisenbarth, Thomas - Other Names:
- SPACE (Conference : Applied cryptography engineering), 7th
- Contents:
- On the (in)Security of ChaCha20 Against Physical Attacks -- An Industrial Outlook on Challenges of Hardware Security in Digital Economy -- How to Digitally Construct and Validate TRNG and PUF Primitives Which Are Based on Physical Phenomenon -- Cache Attacks: From Cloud to Mobile -- May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 -- The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions -- Parameter Choices for LWE -- Efficient Side Channel Testing of Cryptographic Devices Using TVLA -- IoT Insecurity -- Innovation and Incentives in Industry -- Hardware enabled cryptography: Physically Unclonable Functions and Random Numbers as Roots of Trust -- Tackling the Time-Defence: An Instruction Count Based Microarchitectural Side-channel Attack on Block Ciphers -- Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era -- Efficient Software Implementation of Laddering Algorithms over Binary Elliptic Curves -- Analysis of Diagonal Constants in Salsa -- Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults -- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices -- Similarity Based Interactive Private Information Retrieval -- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA) -- Variable-Length Bit Mapping and Error Correcting Codes for Higher-Order Alphabet PUFs -- Mutual FriendOn the (in)Security of ChaCha20 Against Physical Attacks -- An Industrial Outlook on Challenges of Hardware Security in Digital Economy -- How to Digitally Construct and Validate TRNG and PUF Primitives Which Are Based on Physical Phenomenon -- Cache Attacks: From Cloud to Mobile -- May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 -- The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions -- Parameter Choices for LWE -- Efficient Side Channel Testing of Cryptographic Devices Using TVLA -- IoT Insecurity -- Innovation and Incentives in Industry -- Hardware enabled cryptography: Physically Unclonable Functions and Random Numbers as Roots of Trust -- Tackling the Time-Defence: An Instruction Count Based Microarchitectural Side-channel Attack on Block Ciphers -- Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era -- Efficient Software Implementation of Laddering Algorithms over Binary Elliptic Curves -- Analysis of Diagonal Constants in Salsa -- Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults -- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices -- Similarity Based Interactive Private Information Retrieval -- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA) -- Variable-Length Bit Mapping and Error Correcting Codes for Higher-Order Alphabet PUFs -- Mutual Friend Attack Prevention in Social Network Data Publishing -- Short Integrated PKE+PEKS in Standard Model -- Differential Fault Attack on Grain v1, ACORN v3 and Lizard -- Certain observations on ACORN v3 and the Implications to TMDTO Attacks -- Efficient Implementation of Private License Plate Matching Protocols. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource
- Subjects:
- 005.8/2
Computer science
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security
Data encryption (Computer science)
Computers -- Security -- General
Computers -- Information Theory
Computers -- Hardware -- Network Hardware
Computer security
Coding theory & cryptology
Network hardware
Data protection
Computer security
Data encryption (Computer science)
Coding theory
Computer Communication Networks
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319715018
3319715011 - Related ISBNs:
- 9783319715001
3319715003 - Notes:
- Note: Includes bibliographical references and author index.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.366860
- Ingest File:
- 01_341.xml