Security, Privacy, and Applied Cryptography Engineering: Lecture Notes in Computer Science
Editat de Lejla Batina, Stjepan Picek, Mainack Mondalen Limba Engleză Paperback – 7 dec 2022
The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (3) | 318.67 lei 6-8 săpt. | +26.25 lei 10-14 zile |
| Springer – 7 dec 2022 | 461.06 lei 3-5 săpt. | +26.25 lei 10-14 zile |
| Springer International Publishing – 22 dec 2020 | 318.67 lei 6-8 săpt. | |
| Springer – 29 ian 2022 | 401.99 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 390.18 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 461.77 lei - 20%
Preț: 527.36 lei - 20%
Preț: 497.04 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 391.14 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.72 lei - 20%
Preț: 390.69 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 390.35 lei - 20%
Preț: 391.20 lei - 20%
Preț: 392.64 lei - 20%
Preț: 389.90 lei - 20%
Preț: 639.72 lei - 20%
Preț: 461.65 lei - 20%
Preț: 462.05 lei - 15%
Preț: 388.50 lei - 5%
Preț: 516.27 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 535.77 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 400.17 lei - 20%
Preț: 403.00 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 461.06 lei
Preț vechi: 576.32 lei
-20% Nou
Puncte Express: 692
Preț estimativ în valută:
81.57€ • 95.03$ • 71.23£
81.57€ • 95.03$ • 71.23£
Carte disponibilă
Livrare economică 27 decembrie 25 - 10 ianuarie 26
Livrare express 16-20 decembrie pentru 36.24 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031228285
ISBN-10: 3031228286
Pagini: 356
Ilustrații: X, 343 p. 104 illus., 75 illus. in color.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.54 kg
Ediția:1st edition 2022
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3031228286
Pagini: 356
Ilustrații: X, 343 p. 104 illus., 75 illus. in color.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.54 kg
Ediția:1st edition 2022
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Symmetric Cryptography.- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128.- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers.- Hardware Implementation of Masked SKINNY SBox with Application to AEAD.- Bias Cancellation of MixColumns.- Big Brother Is Watching You: A Closer Look At Backdoor Construction.- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs.- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems.- Protecting the most significant bits in scalar multiplication algorithms.- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields.- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view.- Hardware Security and AI.- What Do You See? Transforming Fault Injection Target Characterizations.- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log.- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs.- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation.- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles.- Network security, Authentication, and Privacy.- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology.- An analysis of the hardware-friendliness of AMQ data structures for network security.- RemOD: Operational Drift-adaptive Intrusion Detection.- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.