Security, Privacy, and Applied Cryptography Engineering : 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings /

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Ali, Sk Subidh. (Editor), Danger, Jean-Luc. (Editor), Eisenbarth, Thomas. (Editor)
Format: eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edition:1st ed. 2017.
Series:Security and Cryptology ; 10662
Subjects:
Table of Contents:
  • On the (in)Security of ChaCha20 Against Physical Attacks
  • An Industrial Outlook on Challenges of Hardware Security in Digital Economy
  • How to Digitally Construct and Validate TRNG and PUF Primitives Which Are Based on Physical Phenomenon
  • Cache Attacks: From Cloud to Mobile
  • May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
  • The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions
  • Parameter Choices for LWE
  • Efficient Side Channel Testing of Cryptographic Devices Using TVLA
  • IoT Insecurity - Innovation and Incentives in Industry
  • Hardware enabled cryptography: Physically Unclonable Functions and Random Numbers as Roots of Trust
  • Tackling the Time-Defence: An Instruction Count Based Microarchitectural Side-channel Attack on Block Ciphers
  • Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era
  • Efficient Software Implementation of Laddering Algorithms over Binary Elliptic Curves
  • Analysis of Diagonal Constants in Salsa
  • Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults
  • eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
  • Similarity Based Interactive Private Information Retrieval
  • A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
  • Variable-Length Bit Mapping and Error Correcting Codes for Higher-Order Alphabet PUFs
  • Mutual Friend Attack Prevention in Social Network Data Publishing
  • Short Integrated PKE+PEKS in Standard Model
  • Differential Fault Attack on Grain v1, ACORN v3 and Lizard
  • Certain observations on ACORN v3 and the Implications to TMDTO Attacks
  • Efficient Implementation of Private License Plate Matching Protocols. .