TY - GEN N2 - This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques. DO - 10.1007/978-3-030-90553-8 DO - doi AB - This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques. T1 - Security and privacy :second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, Proceedings / DA - 2021. CY - Cham, Switzerland : AU - Stănică, Pantelimon. AU - Mesnager, Sihem. AU - Debnath, Sumit Kumar. VL - 1497 CN - QA76.9.A25 PB - Springer, PP - Cham, Switzerland : PY - 2021. N1 - Includes author index. ID - 1440872 KW - Computer security KW - Computer networks KW - Sécurité informatique KW - Réseaux d'ordinateurs SN - 9783030905538 SN - 3030905535 TI - Security and privacy :second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, Proceedings / LK - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-90553-8 UR - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-90553-8 ER -