LEADER 04312nam 22006735 450 001 996466288103316 005 20230329143820.0 010 $a3-030-35869-0 024 7 $a10.1007/978-3-030-35869-3 035 $a(CKB)4100000009845162 035 $a(DE-He213)978-3-030-35869-3 035 $a(MiAaPQ)EBC5982931 035 $a(PPN)248601873 035 $a(EXLCZ)994100000009845162 100 $a20191120d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity, Privacy, and Applied Cryptography Engineering$b[electronic resource] $e9th International Conference, SPACE 2019, Gandhinagar, India, December 3?7, 2019, Proceedings /$fedited by Shivam Bhasin, Avi Mendelson, Mridul Nandi 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (X, 237 p. 106 illus., 42 illus. in color.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v11947 311 $a3-030-35868-2 320 $aIncludes bibliographical references and index. 327 $aDeployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security -- Real Processing-in-Memory with Memristive Memory Processing Unit -- Length Preserving Symmetric Encryption: Is it Important? -- Towards Automatic Application of Side Channel Countermeasures -- Challenges in Deep Learning-based Profiled Side-channel Analysis -- A Study of Persistent Fault Analysis -- Internal state recovery attack on Stream Ciphers : Breaking BIVIUM -- Related-key Differential Cryptanalysis of Full Round CRAFT -- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security -- One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA -- An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128 -- Automated Classification of Web-Application Attacks for Intrusion Detection -- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions -- ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch -- Encrypted Classification Using Secure K-Nearest Neighbour Computation -- A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices -- Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. 330 $aThis book constitutes the refereed proceedings of the 9th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2019, held in Gandhinagar, India, in December 2019. The 12 full papers presented were carefully reviewed and selected from 24 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v11947 606 $aData protection 606 $aSoftware engineering 606 $aComputers 606 $aComputer engineering 606 $aComputer networks 606 $aData and Information Security 606 $aSoftware Engineering 606 $aComputer Hardware 606 $aComputer Engineering and Networks 615 0$aData protection. 615 0$aSoftware engineering. 615 0$aComputers. 615 0$aComputer engineering. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aSoftware Engineering. 615 24$aComputer Hardware. 615 24$aComputer Engineering and Networks. 676 $a005.82 702 $aBhasin$b Shivam$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMendelson$b Avi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNandi$b Mridul$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466288103316 996 $aSecurity, privacy, and applied cryptography engineering$92065794 997 $aUNISA