default search action
12th SPACE 2022: Jaipur, India
- Lejla Batina, Stjepan Picek, Mainack Mondal:
Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13783, Springer 2022, ISBN 978-3-031-22828-5
Symmetric Cryptography
- Tarun Yadav, Manoj Kumar:
Modeling Large S-box in MILP and a (Related-Key) Differential Attack on Full Round PIPO-64/128. 3-27 - Rajat Sadhukhan, Anirban Chakraborty, Nilanjan Datta, Sikhar Patranabis, Debdeep Mukhopadhyay:
Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers. 28-49 - Mustafa Khairallah, Shivam Bhasin:
Hardware Implementation of Masked SKINNY SBox with Application to AEAD. 50-69 - Subhadeep Banik, Andrea Caforio, Kostas Papagiannopoulos, Francesco Regazzoni:
Bias Cancellation of MixColumns. 70-80 - Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi:
Big Brother Is Watching You: A Closer Look at Backdoor Construction. 81-96
Public-Key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs
- Ruben Gonzalez, Thom Wiggers:
KEMTLS vs. Post-quantum TLS: Performance on Embedded Systems. 99-117 - Estuardo Alpirez Bock, Lukasz Chmielewski, Konstantina Miteloudi:
Protecting the Most Significant Bits in Scalar Multiplication Algorithms. 118-137 - Madhurima Mukhopadhyay, Palash Sarkar:
Combining Montgomery Multiplication with Tag Tracing for the Pollard Rho Algorithm in Prime Order Fields. 138-146 - Takuro Fukasawa, Yoshifumi Manabe:
Card-Based Zero-Knowledge Proof for the Nearest Neighbor Property: Zero-Knowledge Proof of ABC End View. 147-161
Hardware Security and AI
- Marina Krcek:
What Do You See? Transforming Fault Injection Target Characterizations. 165-184 - Abhishek Revskar, Mahendra Rathor, Urbi Chatterjee:
Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log. 185-203 - Manthan Kojage, Neelofar Hassan, Urbi Chatterjee:
Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs. 204-224 - Mohammad Hashemi, Steffi Roy, Domenic Forte, Fatemeh Ganji:
HWGN2: Side-Channel Protected NNs Through Secure and Private Function Evaluation. 225-248 - Tu Anh Ngo, Reuben Jon Chia, Jonathan Chan Chew Meng, Nandish Chattopadhyay, Anupam Chattopadhyay:
How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles. 249-263
Network Security, Authentication, and Privacy
- Soumyadyuti Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay:
SMarT: A SMT Based Privacy Preserving Smart Meter Streaming Methodology. 267-286 - Arish Sateesan, Jo Vliegen, Nele Mentens:
An Analysis of the Hardware-Friendliness of AMQ Data Structures for Network Security. 287-313 - Vikas Maurya, Nanda Rani, Sandeep Kumar Shukla:
RemOD: Operational Drift-Adaptive Intrusion Detection. 314-333 - SrinivasaRao SubramanyaRao:
A Short Note on a Paper Titled: A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection Using Topology Code for Local Registration and Security Enhancement. 334-341
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.