LEADER 04976nam 22008175 450 001 996465273703316 005 20200630165107.0 010 $a3-642-34416-X 024 7 $a10.1007/978-3-642-34416-9 035 $a(CKB)3280000000002215 035 $a(SSID)ssj0000788977 035 $a(PQKBManifestationID)11407333 035 $a(PQKBTitleCode)TC0000788977 035 $a(PQKBWorkID)10723530 035 $a(PQKB)10387548 035 $a(DE-He213)978-3-642-34416-9 035 $a(MiAaPQ)EBC3070181 035 $a(PPN)168326884 035 $a(EXLCZ)993280000000002215 100 $a20121026d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity, Privacy, and Applied Cryptography Engineering$b[electronic resource] $eSecond International Conference, SPACE 2012, Chennai, India, November 3-4, 2012, Proceedings /$fedited by Andrey Bogdanov, Somitra Sanadhya 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XII, 173 p. 29 illus.) 225 1 $aSecurity and Cryptology ;$v7644 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-34415-1 320 $aIncludes bibliographical references and index. 327 $aA Novel Circuit Design Methodology to Reduce Side Channel Leakage -- The Schedulability of AES as a Countermeasure against Side Channel Attacks -- Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers -- Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs -- Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack -- Towards Formal Analysis of Key Control in Group Key Agreement Protocols -- Some Results on Related Key-IV Pairs of Grain -- A Differential Fault Attack on Grain-128a Using MACs -- Breaking Hitag 2 Revisited -- Reduction in Lossiness of RSA Trapdoor Permutation -- Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters. 330 $aThis book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions.  The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems,  physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices. 410 0$aSecurity and Cryptology ;$v7644 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer security 606 $aComputers and civilization 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 608 $aConference papers and proceedings.$2fast 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 676 $a005.8 702 $aBogdanov$b Andrey$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSanadhya$b Somitra$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Security, Privacy and Applied Cryptography Engineering 906 $aBOOK 912 $a996465273703316 996 $aSecurity, privacy, and applied cryptography engineering$92065794 997 $aUNISA