Security, Privacy, and Applied Cryptography Engineering: 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings

Front Cover
Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth
Springer, Sep 24, 2015 - Computers - 373 pages
1 Review

This book constitutes the refereed proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015.

The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length. The papers are devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.

 

What people are saying - Write a review

User Review - Flag as inappropriate

Please update my permissions to keep out the press and get a sworn statement to help improve my work

Contents

Efficient Protocol for Authenticated Email Search
1
Analyzing Traffic Features of Common Standalone DoS Attack Tools
21
A Case for a Schizoid Design Approach
41
Keep Your Friends Close but Your Enemies Closer
55
Improving Application Security through TLSLibrary Redesign
75
How Not to Combine RC4 States
95
Preimage Analysis of the Maelstrom0 Hash Function
113
MeetintheMiddle Attacks on RoundReduced Khudra
127
Fault Tolerant Infective Countermeasure for AES
190
Solution or Just Another Attempt
210
Investigating SRAM PUFsin large CPUs and GPUs
228
A Double Edged Sword for SecurityCritical Applications
248
Architecture Considerations for Massively Parallel Hardware Security Platform
269
Efficient and Secure Elliptic Curve Cryptography for 8bit AVR Microcontrollers
289
Towards Practical AttributeBased Signatures
310
Hierarchical Ring Signatures Revisited Unconditionally and Perfectly Anonymous Schnorr Version
329

Improved Key Recovery Attack on Roundreduced HierocryptL1 in the SingleKey Setting
139
Sboxes Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks with or without Side Channels
151
Simulations of Optical Emissions for Attacking AES and Masked AES
172
Compact Accumulator Using Lattices
347
Almost Optimum Secret Sharing with Cheating Detection
359
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information