Cantitate/Preț
Produs

Security, Privacy, and Applied Cryptography Engineering: Security and Cryptology

Editat de Lejla Batina, Stjepan Picek, Mainack Mondal
en Limba Engleză Paperback – 29 ian 2022
This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2021, held in Kolkata, India, in December 2021.
The 13 full papers presented were carefully reviewed and selected from 42 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (3) 31867 lei  6-8 săpt. +2625 lei  6-12 zile
  Springer – 7 dec 2022 46106 lei  3-5 săpt. +2625 lei  6-12 zile
  Springer International Publishing – 22 dec 2020 31867 lei  6-8 săpt.
  Springer – 29 ian 2022 40199 lei  6-8 săpt.

Din seria Security and Cryptology

Preț: 40199 lei

Preț vechi: 50249 lei
-20% Nou

Puncte Express: 603

Preț estimativ în valută:
7113 8341$ 6247£

Carte tipărită la comandă

Livrare economică 30 ianuarie-13 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030950842
ISBN-10: 3030950840
Pagini: 276
Ilustrații: IX, 263 p. 62 illus., 43 illus. in color.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.42 kg
Ediția:1st edition 2022
Editura: Springer
Seria Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Symmetric Cryptography.- Computing the Distribution of Differentials over the Non-linear Mapping .- Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security.- LP Based Differential Attack on Round Reduced WARP.- Post-quantum cryptography and homomorphic encryption.- SHELBRS: Location-Based Recommendation Services using Switchable Homomorphic Encryption.- On Threat of Hardware Trojan To Post-Quantum Lattice-based Schemes: A Key Recovery Attack on SABER and beyond.- Safe-Error Attacks on SIKE and CSIDH.- Hardware security and side-channel attacks.- Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV.- Parasite: Mitigating Physical Side-channel Attacks against Neural Networks.- Reinforcement Learning-based Design of Side-channel Countermeasures.- Deep Freezing Attacks on Capacitors and Electronic Circuits.- AI and Cloud security.- Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database .- RobustnessAgainst Adversarial Attacks using Dimensionality.- SoK - Network Intrusion Detection on FPGA.