001451973 000__ 05952cam\a2200613\i\4500 001451973 001__ 1451973 001451973 003__ OCoLC 001451973 005__ 20230310003335.0 001451973 006__ m\\\\\o\\d\\\\\\\\ 001451973 007__ cr\cn\nnnunnun 001451973 008__ 221227s2022\\\\sz\a\\\\o\\\\\101\0\eng\d 001451973 019__ $$a1353837032$$a1354207711 001451973 020__ $$a9783031228292$$q(electronic bk.) 001451973 020__ $$a3031228294$$q(electronic bk.) 001451973 020__ $$z9783031228285 001451973 020__ $$z3031228286 001451973 0247_ $$a10.1007/978-3-031-22829-2$$2doi 001451973 035__ $$aSP(OCoLC)1356272409 001451973 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP$$dOCLCQ$$dBRX 001451973 049__ $$aISEA 001451973 050_4 $$aQA76.9.A25 001451973 08204 $$a005.8$$223/eng/20221227 001451973 1112_ $$aSPACE (Conference : Applied cryptography engineering)$$n(12th :$$d2022 :$$cJaipur, India). 001451973 24510 $$aSecurity, Privacy, and Applied Cryptography Engineering :$$b11th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022 /$$cLejla Batina, Stjepan Picek, Mainack Mondal (eds.). 001451973 24630 $$aSPACE 2022 001451973 264_1 $$aCham :$$bSpringer,$$c[2022] 001451973 264_4 $$c©2022 001451973 300__ $$a1 online resource (x, 343 pages) :$$billustrations (some color). 001451973 336__ $$atext$$btxt$$2rdacontent 001451973 337__ $$acomputer$$bc$$2rdamedia 001451973 338__ $$aonline resource$$bcr$$2rdacarrier 001451973 4901_ $$aLecture notes in computer science ;$$v13783 001451973 500__ $$aSelected conference papers. 001451973 500__ $$aIncludes author index. 001451973 504__ $$aReferences -- Hardware Implementation of Masked SKINNY SBox with Application to AEAD -- 1 Introduction -- 2 Background -- 2.1 Hardware Masking, Revisited ch3de2018hardware -- 2.2 SKINNY ch3beierle2016skinny -- 2.3 Romulus -- 2.4 SILVER Leakage Assessment Tool -- 3 Masking the SKINNY SBox -- 4 Formal Verification -- 5 Unit Testing -- 5.1 Accelerated Test Set-Up -- 5.2 Amplification of SNR -- 5.3 The Practical Issue with Hardware Masking and How to Address It -- 6 Implementation of the Full Romulus Modes -- 6.1 Double-Edged Implementations -- 7 Synthesis Results -- 8 Concluding Thoughts 001451973 504__ $$aReferences -- Bias Cancellation of MixColumns -- 1 Introduction -- 2 Bias Cancellation -- 3 Applications -- 3.1 Adding an 11th Round -- 3.2 Adding Non-Linearity -- 4 Conclusion and Future Work -- References -- Big Brother Is Watching You: A Closer Look at Backdoor Construction -- 1 Introduction -- 1.1 Contribution -- 1.2 Prerequisite -- 1.3 Organisation -- 2 Background -- 2.1 Implementation Level and Cipher Level Backdoors -- 2.2 Context -- 3 Basic Concepts -- 3.1 Practical Application of a Backdoor -- 3.2 Associated Notions of Security -- 4 ZUGZWANG: Constructing a Block Cipher with a Backdoor 001451973 5050_ $$aSymmetric Cryptography -- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 -- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers -- Hardware Implementation of Masked SKINNY SBox with Application to AEAD -- Bias Cancellation of MixColumns -- Big Brother Is Watching You: A Closer Look At Backdoor Construction -- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs -- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems -- Protecting the most significant bits in scalar multiplication algorithms -- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields -- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view -- Hardware Security and AI -- What Do You See? Transforming Fault Injection Target Characterizations -- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log -- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs -- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation -- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles -- Network security, Authentication, and Privacy -- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology -- An analysis of the hardware-friendliness of AMQ data structures for network security -- RemOD: Operational Drift-adaptive Intrusion Detection -- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement. 001451973 506__ $$aAccess limited to authorized users. 001451973 520__ $$aThis book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 912, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy. 001451973 588__ $$aDescription based on print version record. 001451973 650_0 $$aComputer security$$vCongresses. 001451973 655_0 $$aElectronic books. 001451973 655_7 $$aConference papers and proceedings.$$2lcgft 001451973 7001_ $$aBatina, Lejla,$$eeditor.$$1https://isni.org/isni/0000000395362014 001451973 7001_ $$aPicek, Stjepan,$$eeditor. 001451973 7001_ $$aMondal, Mainack,$$eeditor. 001451973 77608 $$iPrint version:$$aSPACE (Conference : Applied cryptography engineering) (12th : 2022 : Jaipur, India), creator.$$tSecurity, Privacy, and Applied Cryptography Engineering.$$dCham : Springer Nature Switzerland, 2023$$z9783031228285$$w(OCoLC)1351686725 001451973 830_0 $$aLecture notes in computer science ;$$v13783. 001451973 852__ $$bebk 001451973 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-22829-2$$zOnline Access$$91397441.1 001451973 909CO $$ooai:library.usi.edu:1451973$$pGLOBAL_SET 001451973 980__ $$aBIB 001451973 980__ $$aEBOOK 001451973 982__ $$aEbook 001451973 983__ $$aOnline 001451973 994__ $$a92$$bISE