Security, Privacy, and Applied Cryptography Engineering
Springer International Publishing (Verlag)
978-3-031-22828-5 (ISBN)
The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
Symmetric Cryptography.- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128.- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers.- Hardware Implementation of Masked SKINNY SBox with Application to AEAD.- Bias Cancellation of MixColumns.- Big Brother Is Watching You: A Closer Look At Backdoor Construction.- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs.- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems.- Protecting the most significant bits in scalar multiplication algorithms.- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields.- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view.- Hardware Security and AI.- What Do You See? Transforming Fault Injection Target Characterizations.- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log.- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs.- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation.- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles.- Network security, Authentication, and Privacy.- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology.- An analysis of the hardware-friendliness of AMQ data structures for network security.- RemOD: Operational Drift-adaptive Intrusion Detection.- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.
Erscheinungsdatum | 08.12.2022 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | X, 343 p. 104 illus., 75 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 545 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Artificial Intelligence • authentication • Communication Systems • Computer Hardware • Computer Networks • Computer Science • Computer Security • Computer systems • computer vision • cryptography • Data Security • digital watermarking • Engineering • Field Programmable Gate Array (FPGA) • Internet • Mathematics • Network Protocols • Network Security • Signal Processing • Software Design • Software engineering • Telecommunication networks • Telecommunication Systems |
ISBN-10 | 3-031-22828-6 / 3031228286 |
ISBN-13 | 978-3-031-22828-5 / 9783031228285 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich