ISI Logo

SPACE 2019
December 3 - 7
Gandhinagar, India
9th International Conference on Security, Privacy and Applied Cryptographic Engineering

SPACE 2019

A Study of Persistent Fault Analysis
Andrea Caforio and Subhadeep Banik

Internal state recovery attack on Stream Ciphers : Breaking BIVIUM
Shravani Shahapure, Virendra Sule and Rohin Daruwala

Related-key Differential Cryptanalysis of Full Round CRAFT
Muhammad Elsheikh and Amr Youssef

SpookChain: Chaining a Sponge-Based AEAD with Beyong-Birthday Security
Gaëtan Cassiers, Chun Guo, Olivier Pereira, Thomas Peters and François-Xavier Standaert

One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
Léo Weissbart, Stjepan Picek and Lejla Batina

An Efficient Practical Implementation of Impossible Differential Cryptanalysis Attack on five-round AES-128 using Parallelism
Debranjan Pal, Dishank Agrawal, Abhijit Das and Dipanwita Roy Chowdhury

Automated Classification of Web-Application Attacks for Intrusion Detection
Harsh Bhagwani, Rohit Negi, Aneet Kumar Dutta, Anand Handa, Nitesh Kumar and Sandeep Kumar Shukla

Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions
Durba Chatterjee, Aritra Hazra and Debdeep Mukhopadhyay

ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch
Vidya Govindan, Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi and Rajat Subhra Chakraborty

Encrypted Classification Using Secure K-Nearest Neighbour Computation
B Pradeep Kumar Reddy and Ayantika Chatterjee

A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices
Kishan Chand Gupta, Sumit Kumar Pandey and Susanta Samanta

Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations
Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay and Rajat Subhra Chakraborty

Privacy-Preserving Dummy Generation in Location-Based Services
Dilay Parmar, Udai Pratap Rao, SVNIT Surat

ALEXIA: A Processor with Light Weight Extensions for Meltdown Safe Memory Safety
Gnanambikia Krishnakumar

Power and Security-Aware EDA Methodologies for Lightweight Cipher-module Development
Rajat Sadhukhan and Debdeep Mukhopadhyay

Securing Post Quantum Signature, SPHINCS: A case study on its building block, ChaCha
Dillibabu Shanmugam

Robust message authentication in the context of Quantum Key Distribution
Dillibabu Shanmugam

Logic Synthesis of Arbiter PUF using Binarized Neural Networks
Pranesh Shantikellur, Rijoy Mukherjee, Rajat Subhra Chakraborthy

Contact webmaster Arghya Bhattacharjee at
Based on the ASK 2015 website, original template designed by KU Leuven - COSIC