Security, Privacy, and Applied Cryptography Engineering

5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings

  • Rajat Subhra Chakraborty
  • Peter Schwabe
  • Jon Solworth
Conference proceedings SPACE 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9354)

Also part of the Security and Cryptology book sub series (LNSC, volume 9354)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Sanjit Chatterjee, Sayantan Mukherjee, Govind Patidar
    Pages 1-20
  3. Trent Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Rueda, Joshua Schiffman, Hayawardh Vijayakumar
    Pages 55-74
  4. Leo St. Amour, W. Michael Petullo
    Pages 75-94
  5. Subhadeep Banik, Sonu Jha
    Pages 95-112
  6. Riham AlTawy, Amr M. Youssef
    Pages 113-126
  7. Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef
    Pages 127-138
  8. Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef
    Pages 139-150
  9. Guido M. Bertoni, Lorenzo Grassi, Filippo Melzani
    Pages 172-189
  10. Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay
    Pages 190-209
  11. Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Lejla Batina
    Pages 210-227
  12. Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen
    Pages 228-247
  13. Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo et al.
    Pages 248-268
  14. Erick Nascimento, Julio López, Ricardo Dahab
    Pages 289-309
  15. Brinda Hampiholi, Gergely Alpár, Fabian van den Broek, Bart Jacobs
    Pages 310-328
  16. Łukasz Krzywiecki, Małgorzata Sulkowska, Filip Zagórski
    Pages 329-346
  17. Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini
    Pages 347-358
  18. Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini
    Pages 359-372
  19. Back Matter
    Pages 373-373

About these proceedings


This book constitutes the refereed proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015.

The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length. The papers are devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.


access control authentication cryptography digital rights management security and privacy algorithms cryptanalysis and other attacks denial-of-service attacks elliptic curves embedded systems security encryption fault attack hardware security implementations hardware-based security protocols infection countermeasure malicious design modifications profiling attacks side-channel analysis and countermeasures software security engineering stream cipher

Editors and affiliations

  • Rajat Subhra Chakraborty
    • 1
  • Peter Schwabe
    • 2
  • Jon Solworth
    • 3
  1. 1.Indian Inst of Tech KharagpurKharagpurIndia
  2. 2.Digital Security GroupRadboud University NijmegenNijmegenThe Netherlands
  3. 3.Dept. of Computer ScienceUniversity of Illinois at ChicagoChicagoUSA

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-24125-8
  • Online ISBN 978-3-319-24126-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment