A Study of Persistent Fault Analysis
Andrea Caforio and Subhadeep Banik
Internal state recovery attack on Stream Ciphers : Breaking BIVIUM
Shravani Shahapure, Virendra Sule and Rohin Daruwala
Related-key Differential Cryptanalysis of Full Round CRAFT
Muhammad Elsheikh and Amr Youssef
SpookChain: Chaining a Sponge-Based AEAD with Beyong-Birthday Security
Gaëtan Cassiers, Chun Guo, Olivier Pereira, Thomas Peters and François-Xavier Standaert
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
Léo Weissbart, Stjepan Picek and Lejla Batina
An Efficient Practical Implementation of Impossible Differential Cryptanalysis Attack on five-round AES-128 using Parallelism
Debranjan Pal, Dishank Agrawal, Abhijit Das and Dipanwita Roy Chowdhury
Automated Classification of Web-Application Attacks for Intrusion Detection
Harsh Bhagwani, Rohit Negi, Aneet Kumar Dutta, Anand Handa, Nitesh Kumar and Sandeep Kumar Shukla
Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions
Durba Chatterjee, Aritra Hazra and Debdeep Mukhopadhyay
ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch
Vidya Govindan, Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi and Rajat Subhra Chakraborty
Encrypted Classification Using Secure K-Nearest Neighbour Computation
B Pradeep Kumar Reddy and Ayantika Chatterjee
A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices
Kishan Chand Gupta, Sumit Kumar Pandey and Susanta Samanta
Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations
Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay and Rajat Subhra Chakraborty
Privacy-Preserving Dummy Generation in Location-Based Services
Dilay Parmar, Udai Pratap Rao, SVNIT Surat
ALEXIA: A Processor with Light Weight Extensions for Meltdown Safe Memory Safety
Gnanambikia Krishnakumar
Power and Security-Aware EDA Methodologies for Lightweight Cipher-module Development
Rajat Sadhukhan and Debdeep Mukhopadhyay
Securing Post Quantum Signature, SPHINCS: A case study on its building block, ChaCha
Dillibabu Shanmugam
Robust message authentication in the context of Quantum Key Distribution
Dillibabu Shanmugam
Logic Synthesis of Arbiter PUF using Binarized Neural Networks
Pranesh Shantikellur, Rijoy Mukherjee, Rajat Subhra Chakraborthy