000 04003nam a22006015i 4500
001 978-3-031-51583-5
003 DE-He213
005 20240730170913.0
007 cr nn 008mamaa
008 240104s2024 sz | s |||| 0|eng d
020 _a9783031515835
_9978-3-031-51583-5
024 7 _a10.1007/978-3-031-51583-5
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity, Privacy, and Applied Cryptography Engineering
_h[electronic resource] :
_b13th International Conference, SPACE 2023, Roorkee, India, December 14-17, 2023, Proceedings /
_cedited by Francesco Regazzoni, Bodhisatwa Mazumdar, Sri Parameswaran.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aX, 261 p. 36 illus., 25 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14412
505 0 _aResults on the Key Space of Group-Ring NTRU: The Case of the Dihedral Group -- Gangopadhyay Token Open Secure and Post-quantum Updatable Encryption Based on MLWE -- Knowledge Proofs for SIDH variants with Masked Degree or Torsion -- Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation -- Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme -- Cryptanalysis with Countermeasure on the SIS Based Signature Scheme -- Vulnerability of Dynamic Masking in Test Compression -- An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation -- High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA -- On the Masking-Friendly Designs for Post-Quantum Cryptography -- Spliced Region Detection and Localization in Digital Images based on CNN Learning Guided by Color Transitions and Surface Texture -- UN-SPLIT: Attacking Split Manufacturing using Link Prediction in Graph Neural Networks -- Logarithmic-Size (Linkable) Ring Signatures From Lattice Isomorphism Problems -- "We must protect the Transformers": Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models.
520 _aThis book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2023, held in Roorkee, India, in December 2023. The 14 papers included in these proceedings were carefully reviewed and selected from 45 submissions. They focus on various aspects of security, privacy, applied cryptography, and cryptographic engineering.
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 0 _aImage processing
_xDigital techniques.
_94145
650 0 _aComputer vision.
_996125
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_996126
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
_931569
700 1 _aRegazzoni, Francesco.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_996127
700 1 _aMazumdar, Bodhisatwa.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_996129
700 1 _aParameswaran, Sri.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_996130
710 2 _aSpringerLink (Online service)
_996131
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031515828
776 0 8 _iPrinted edition:
_z9783031515842
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14412
_923263
856 4 0 _uhttps://doi.org/10.1007/978-3-031-51583-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cEBK
999 _c87267
_d87267