LEADER 03818nam 22006255 450 001 9910799215403321 005 20240104180244.0 010 $a3-031-51583-8 024 7 $a10.1007/978-3-031-51583-5 035 $a(CKB)29526949000041 035 $a(DE-He213)978-3-031-51583-5 035 $a(MiAaPQ)EBC31094005 035 $a(Au-PeEL)EBL31094005 035 $a(EXLCZ)9929526949000041 100 $a20240104d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity, Privacy, and Applied Cryptography Engineering $e13th International Conference, SPACE 2023, Roorkee, India, December 14?17, 2023, Proceedings /$fedited by Francesco Regazzoni, Bodhisatwa Mazumdar, Sri Parameswaran 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (X, 261 p. 36 illus., 25 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14412 311 08$a9783031515828 320 $aIncludes bibliographical references and index. 327 $aResults on the Key Space of Group-Ring NTRU: The Case of the Dihedral Group -- Gangopadhyay Token Open Secure and Post-quantum Updatable Encryption Based on MLWE -- Knowledge Proofs for SIDH variants with Masked Degree or Torsion -- Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation -- Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme -- Cryptanalysis with Countermeasure on the SIS Based Signature Scheme -- Vulnerability of Dynamic Masking in Test Compression -- An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation -- High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA -- On the Masking-Friendly Designs for Post-Quantum Cryptography -- Spliced Region Detection and Localization in Digital Images based on CNN Learning Guided by Color Transitions and Surface Texture -- UN-SPLIT: Attacking Split Manufacturing using Link Prediction in Graph Neural Networks -- Logarithmic-Size (Linkable) Ring Signatures From Lattice Isomorphism Problems -- ?We must protect the Transformers?: Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models. 330 $aThis book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2023, held in Roorkee, India, in December 2023. The 14 papers included in these proceedings were carefully reviewed and selected from 45 submissions. They focus on various aspects of security, privacy, applied cryptography, and cryptographic engineering. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14412 606 $aData protection 606 $aComputer networks 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 615 0$aData protection. 615 0$aComputer networks. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 676 $a005.8 702 $aRegazzoni$b Francesco 702 $aMazumdar$b Bodhisatwa 702 $aParameswaran$b Sri$f1962- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910799215403321 996 $aSecurity, privacy, and applied cryptography engineering$92065794 997 $aUNINA