Security, Privacy, and Applied Cryptography Engineering : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings /: 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings. (2020)
- Record Type:
- Book
- Title:
- Security, Privacy, and Applied Cryptography Engineering : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings /: 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings. (2020)
- Main Title:
- Security, Privacy, and Applied Cryptography Engineering : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings
- Further Information:
- Note: Shivam Bhasin, Avi Mendelson, Mridul Nandi.
- Editors:
- Mendelson, Avi
Nandi, Mridul - Other Names:
- Bhasin, Shivam, 1985-
- Contents:
- Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security.- Real Processing-in-Memory with Memristive Memory Processing Unit.- Length Preserving Symmetric Encryption: Is it Important?.- Towards Automatic Application of Side Channel Countermeasures.- Challenges in Deep Learning-based Profiled Side-channel Analysis.- A Study of Persistent Fault Analysis.- Internal state recovery attack on Stream Ciphers : Breaking BIVIUM.- Related-key Differential Cryptanalysis of Full Round CRAFT.- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security.- One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA.- An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128.- Automated Classification of Web-Application Attacks for Intrusion Detection.- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions.- ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch.- Encrypted Classification Using Secure K-Nearest Neighbour Computation.- A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices.- Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Copyright Date:
- 2019
- Extent:
- 1 online resource (237 pages)
- Subjects:
- Computer science
Data protection
Software engineering
Computer hardware
Computer organization
Computers -- Software Development & Engineering -- General
Computers -- Hardware -- General
Computers -- Networking -- General
Software Engineering
Computer hardware
Computer networking & communications
Computers -- Security -- General
Computer security - Languages:
- English
- ISBNs:
- 9783030358693
- Related ISBNs:
- 9783030358686
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.474214
- Ingest File:
- 03_027.xml