Important Links

Submission Link
Visa to India
Registration link

Sponsors & Co-Organizers

Conference Proceedings

The conference proceedings is available for the participants through this link. Please enter password shared in the registration kit to access the proceedings.

Click here after entering the password to access the proceedings

Accepted Papers

Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128
Tarun Yadav and Manoj Kumar (Scientific Analysis Group, DRDO, India

Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers
Rajat Sadhukhan, Anirban Chakraborty, Nilanjan Datta, Sikhar Patranabis and Debdeep Mukhopadhyay (IIT Kharagpur, India / IAI, TCG Crest, India / IBM Research, India)

Hardware Implementation of Masked SKINNY SBox with Application to AEAD
Mustafa Khairallah and Shivam Bhasin (NTU Singapore, Singapore / Seagate research, Signapore)

Bias Cancellation of MixColumns
Subhadeep Banik, Andrea Caforio, Kostas Papagiannopoulos and Francesco Regazzoni (Universita della Svizzera Italiana, Lugano, Switzerland / LASEC, Ecole Polytechnique Fédérale de Lausanne, Switzerland / University of Amsterdam, The Netherlands)

Big Brother Is Watching You: A Closer Look At Backdoor Construction
Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe and Mridul Nandi (NTU Singapore, Singapore / ISI Kolkata, India / Silicon Austria Labs, Graz, Austria / University of Hyogo, Kobe, Japan)

Protecting the most significant bits in scalar multiplication algorithms
Estuardo Alpirez Bock, Lukasz Chmielewski and Konstantina Miteloudi (Aalto University, Finland / Masaryk University, Czech Republic / Radboud University, Nijmegen, The Netherlands)

KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems
Ruben Gonzalez and Thom Wiggers (Neodyme AG, Garching, Germany / Radboud University, Nijmegen, The Netherlands)

Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view
Takuro Fukasawa and Yoshifumi Manabe (Kogakuin University, Shinjuku,Tokyo, Japan)

Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields
Madhurima Mukhopadhyay and Palash Sarkar (IIT Kanpur, India / ISI Kolkata, India)

Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log
Abhishek Revskar, Mahendra Rathor and Urbi Chatterjee (IIT Kanpur, India)

What Do You See? Transforming Fault Injection Target Characterizations
Marina Krček (Delft University of Technology, The Netherlands)

HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation
Mohammad Hashemi, Steffi Roy, Domenic Forte and Fatemeh Ganji (Worcester Polytechnic Institute, MA, USA / University of Florida, Florida, USA)

Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs
Manthan Kojage, Neelofar Hassan and Urbi Chatterjee (IIT Kanpur, India)

How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles
Tu A. Ngo, Reuben J. Chia, Jonathan Chan, Nandish Chattopadhyay and Anupam Chattopadhyay (NTU Singapore, Singapore)

SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology
Soumyadyuti Ghosh, Soumyajit Dey and Debdeep Mukhopadhyay (IIT Kharagpur, India)

An analysis of the hardware-friendliness of AMQ data structures for network security
Arish Sateesan, Jo Vliegen and Nele Mentens (imec-COSIC/ES&S, ESAT, KU Leuven, Belgium / LIACS, Leiden University, The Netherlands)

RemOD: Operational Drift-adaptive Intrusion Detection
Vikas Maurya, Nanda Rani and Sandeep Shukla (IIT Kanpur, India)

A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement
SrinivasaRao SubramanyaRao (Cybersecurity Researcher and Consultant, Canberra, Australia)