Advertisement

Security, Privacy, and Applied Cryptography Engineering

8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings

  • Anupam Chattopadhyay
  • Chester Rebeiro
  • Yuval Yarom
Conference proceedings SPACE 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11348)

Also part of the Security and Cryptology book sub series (LNSC, volume 11348)

Table of contents

  1. Front Matter
    Pages I-XXX
  2. Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay
    Pages 21-36
  3. Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani
    Pages 37-51
  4. Ajeet Singh, Vikas Tiwari, Appala Naidu Tentu
    Pages 52-64
  5. Séamus Brannigan, Máire O’Neill, Ayesha Khalid, Ciara Rafferty
    Pages 65-84
  6. Varsha Satheesh, Dillibabu Shanmugam
    Pages 85-103
  7. Archanaa S. Krishnan, Patrick Schaumont
    Pages 104-124
  8. Reza Azarderakhsh, Elena Bakos Lang, David Jao, Brian Koziel
    Pages 125-141
  9. Devansh Gupta, Somanath Tripathy, Bodhisatwa Mazumdar
    Pages 142-156
  10. Stjepan Picek, Ioannis Petros Samiotis, Jaehun Kim, Annelie Heuser, Shivam Bhasin, Axel Legay
    Pages 157-176
  11. Navid Vafaei, Nasour Bagheri, Sayandeep Saha, Debdeep Mukhopadhyay
    Pages 177-197
  12. Back Matter
    Pages 219-219

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018.
The 12 full papers presented together with 5 short paper, were carefully reviewed and selected from 34 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Keywords

applied cryptography artificial intelligence authentication bits block ciphers case based reasoning cbr computer architecture efficient cryptography implementations electronic Voting fault attacks isogeny knowledge-based system light weight cryptography micro-architectural attacks public key cryptography secret key side channel analysis side channel attack software security

Editors and affiliations

  1. 1.School of Computer Science and EngineeringNanyang Technological UniversitySingaporeSingapore
  2. 2.Indian Institute of Technology MadrasChennaiIndia
  3. 3.University of AdelaideAdelaideAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-05072-6
  • Copyright Information Springer Nature Switzerland AG 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-05071-9
  • Online ISBN 978-3-030-05072-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences