Speaker |
Affiliation |
Expertise |
Talk Title |
Prof. Makoto Nagata |
Professor, Kobe University, Japan |
Circuit Design Methods for hardware Security |
Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware SecurityAbstract and Short Bio |
Prof. Shahar Kvatinsky |
Assistant Professor, Technion - Israel Institute of Technology |
Security of Emerging Memory Technologies |
Real Processing-in-Memory with Memristive Memory Processing UnitAbstract and Short Bio |
Dr. Shashwat Raizada |
Cyber Security Expert, Robert Bosch Engineering and Business Solutions Pvt Ltd |
Automotive Security and IoT Security |
Cars and Crypto: A Match made in HeavenAbstract and Short Bio |
Uri Bear |
Security Research Manager, Intel, Israel |
Physical Attacks/Reverse Engineering |
Privacy & Security in the Land of Advanced HackingAbstract and Short Bio |
Dr. Debrup Chakraborty |
Associate Professor, ISI Kolkata, India |
Provably secure symmetric encryption schemes |
Length Preserving Symmetric Encryption: Is it Important?Abstract and Short Bio |
Dr. Yu Sasaki |
Security Researcher, NTT Secure Platform Laboratories, Japan |
Symmetric key cryptography, Cryptanalysis |
An Automated Differential Trail Search using MILPAbstract and Short Bio |
Dr. Francesco Regazzoni |
Senior Researcher, ALaRI Institute, Università della Svizzera italiana, Lugano, Switzerland |
Design Automation for Security |
Towards Automatic Application of Side Channel CountermeasuresAbstract and Short Bio |
Stjepan Picek |
Asst. Professor, TU Delft, The Netherlands |
Implementation Attacks, Machine Learning, AI |
Challenges in Deep Learning-based Profiled Side-channel AnalysisAbstract and Short Bio |