Skip to main content
  • Conference proceedings
  • © 2012

Security, Privacy, and Applied Cryptography Engineering

Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012, Proceedings

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7644)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SPACE: International Conference on Security, Privacy, and Applied Cryptography Engineering

Conference proceedings info: SPACE 2012.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (11 papers)

  1. Front Matter

  2. A Novel Circuit Design Methodology to Reduce Side Channel Leakage

    • Andreas Gornik, Ivan Stoychev, Jürgen Oehm
    Pages 1-15
  3. Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs

    • Dai Yamamoto, Gabriel Hospodar, Roel Maes, Ingrid Verbauwhede
    Pages 45-62
  4. Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack

    • Sumit Kumar Pandey, Santanu Sarkar, Mahabir Prasad Jhanwar
    Pages 63-76
  5. Some Results on Related Key-IV Pairs of Grain

    • Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
    Pages 94-110
  6. A Differential Fault Attack on Grain-128a Using MACs

    • Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
    Pages 111-125
  7. Breaking Hitag 2 Revisited

    • Vincent Immler
    Pages 126-143
  8. Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters

    • Kunwar Singh, C. Pandurangan, A. K. Banerjee
    Pages 153-172
  9. Back Matter

Other Volumes

  1. Security, Privacy, and Applied Cryptography Engineering

About this book

This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012.

The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.

Editors and Affiliations

  • ESAT/SCD/COSIC, KU Leuven, Leuven-Heverlee, Belgium

    Andrey Bogdanov

  • IIIT Delhi, India

    Somitra Sanadhya

Bibliographic Information

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access