03818nam 22006255 450 991079921540332120240104180244.03-031-51583-810.1007/978-3-031-51583-5(CKB)29526949000041(DE-He213)978-3-031-51583-5(MiAaPQ)EBC31094005(Au-PeEL)EBL31094005(EXLCZ)992952694900004120240104d2024 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierSecurity, Privacy, and Applied Cryptography Engineering 13th International Conference, SPACE 2023, Roorkee, India, December 14–17, 2023, Proceedings /edited by Francesco Regazzoni, Bodhisatwa Mazumdar, Sri Parameswaran1st ed. 2024.Cham :Springer Nature Switzerland :Imprint: Springer,2024.1 online resource (X, 261 p. 36 illus., 25 illus. in color.) Lecture Notes in Computer Science,1611-3349 ;144129783031515828 Includes bibliographical references and index.Results on the Key Space of Group-Ring NTRU: The Case of the Dihedral Group -- Gangopadhyay Token Open Secure and Post-quantum Updatable Encryption Based on MLWE -- Knowledge Proofs for SIDH variants with Masked Degree or Torsion -- Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation -- Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme -- Cryptanalysis with Countermeasure on the SIS Based Signature Scheme -- Vulnerability of Dynamic Masking in Test Compression -- An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation -- High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA -- On the Masking-Friendly Designs for Post-Quantum Cryptography -- Spliced Region Detection and Localization in Digital Images based on CNN Learning Guided by Color Transitions and Surface Texture -- UN-SPLIT: Attacking Split Manufacturing using Link Prediction in Graph Neural Networks -- Logarithmic-Size (Linkable) Ring Signatures From Lattice Isomorphism Problems -- ”We must protect the Transformers”: Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models.This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2023, held in Roorkee, India, in December 2023. The 14 papers included in these proceedings were carefully reviewed and selected from 45 submissions. They focus on various aspects of security, privacy, applied cryptography, and cryptographic engineering.Lecture Notes in Computer Science,1611-3349 ;14412Data protectionComputer networksImage processingDigital techniquesComputer visionData and Information SecurityComputer Communication NetworksComputer Imaging, Vision, Pattern Recognition and GraphicsData protection.Computer networks.Image processingDigital techniques.Computer vision.Data and Information Security.Computer Communication Networks.Computer Imaging, Vision, Pattern Recognition and Graphics.005.8Regazzoni FrancescoMazumdar BodhisatwaParameswaran Sri1962-MiAaPQMiAaPQMiAaPQBOOK9910799215403321Security, privacy, and applied cryptography engineering2065794UNINA