Skip to main content
  • Conference proceedings
  • © 2013

Security, Privacy, and Applied Cryptography Engineering

Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8204)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SPACE: International Conference on Security, Privacy, and Applied Cryptography Engineering

Conference proceedings info: SPACE 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (12 papers)

  1. Front Matter

  2. Implementations and Protocols

    1. Three Design Dimensions of Secure Embedded Systems

      • Patrick Schaumont, Aydin Aysu
      Pages 1-20
    2. Investigating the Application of One Instruction Set Computing for Encrypted Data Computation

      • Nektarios Georgios Tsoutsos, Michail Maniatakos
      Pages 21-37
    3. Alphanumeric Shellcode Generator for ARM Architecture

      • Pratik Kumar, Nagendra Chowdary, Anish Mathuria
      Pages 38-39
  3. Side Channel Attacks and Countermeasures

    1. A Time Series Approach for Profiling Attack

      • Liran Lerman, Gianluca Bontempi, Souhaib Ben Taieb, Olivier Markowitch
      Pages 75-94
    2. Algorithms for Switching between Boolean and Arithmetic Masking of Second Order

      • Praveen Kumar Vadnala, Johann Großschädl
      Pages 95-110
  4. Identity-Based Identification Schemes

    1. Identity-Based Identification Schemes from ID-KEMs

      • Prateek Barapatre, Chandrasekaran Pandu Rangan
      Pages 111-129
    2. Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings

      • Prateek Barapatre, Chandrasekaran Pandu Rangan
      Pages 130-146
  5. Signatures

    1. From Selective-ID to Full-ID IBS without Random Oracles

      • Sanjit Chatterjee, Chethan Kamath
      Pages 172-190
  6. Back Matter

Other Volumes

  1. Security, Privacy, and Applied Cryptography Engineering

About this book

This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.

Editors and Affiliations

  • ESAT/SCD-COSIC, KU Leuven, Heverlee, Belgium

    Benedikt Gierlichs

  • COMELEC Department, Crypto Group (SEN), 46 rue Barrault, Institut MINES-TELECOM, TELECOM-ParisTech, CNRS LTCI, Paris, France

    Sylvain Guilley

  • Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India

    Debdeep Mukhopadhyay

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access