Important Dates


Submission Due: September 14, 2022
Notification: October 20, 2022
Camera-ready Version: October 30, 2022
Conference: December 9-12, 2022

Important Links


Submission Link
Visa to India
Registration link


Sponsors & Co-Organizers




























Program Schedule


December 09, 2022 (DAY 1: 8:30 AM to 7:15 PM IST)
8:30-9:00 Welcome Note
09:00-10:30 Tutorial 1
Zero-Knowledge Proofs in Practice: Demystifying Blockchain Rollups
Dr. Sikhar Patranabis, Dr. Nitin Singh, IBM Research
Chair: Mainack Mondal, IIT Kharagpur
10:30-11:00 Break
11:00- 12:30 Tutorial 1 (continued)
Zero-Knowledge Proofs in Practice: Demystifying Blockchain Rollups
Dr. Sikhar Patranabis, Dr. Nitin Singh, IBM Research
Chair: Mainack Mondal, IIT Kharagpur
12:30- 14:00 Lunch
14:00- 15:30 TUTORIAL - 2
Attacking Real-World Crypto With Side-Channel Analysis
Łukasz Chmielewski, Radboud University, The Netherlands
Chair: Chester Rebeiro, IIT Madras
15:30- 16:00 Break
16:00- 17:30 TUTORIAL - 2 (continued)
Attacking Real-World Crypto With Side-Channel Analysis
Łukasz Chmielewski, Radboud University, The Netherlands
Chair: Chester Rebeiro, IIT Madras
17:30- 17:45 Tea Break
17:45- 18:45 KEYNOTE TALK - 1

Security Challenges in Internet of Things (IoT) and Cyber Physical Systems (CPS)
Prof. Sanjay K Jha, UNSW Sydney, Australia
Chair: Jayaprakash Kar, LMNIT Jaipur
18:45- 19:15 High Tea
Dec 10 2022: Day 2
9:00-10:00 Conference opening
10:00-11:00 KEYNOTE TALK - 2
Title: Hardware: an essential partner to cryptography
Prof. Ingrid Verbauwhede, KU Leuven, Belgium
Chair: Debdeep Mukhopdhyay, IIT Kharagpur, India
11:00- 11:30 Break
11:30- 13:00 PAPER SESSION - 1:Symmetric Cryptography 1

Chair: Ingrid Verbauwhede, KU Leuven, Belgium
- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128
Tarun Yadav and Manoj Kumar (Scientific Analysis Group, DRDO, India)
- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers
Rajat Sadhukhan, Anirban Chakraborty, Nilanjan Datta, Sikhar Patranabis and Debdeep Mukhopadhyay (IIT Kharagpur, India / IAI, TCG Crest, India / IBM Re-search, India)
- Big Brother Is Watching You: A Closer Look At Backdoor Construction 76
13:00- 14:00 Lunch
14:00-15:00 KEYNOTE TALK - 3
Title: Towards Secure Computing Systems
Prof. Chester Rebeiro, IIT Madras, India
Chair: Mainack Mondal, IIT Kharagpur
15:00- 16:00 PAPER SESSION - 2: Network Security

Chair: Łukasz Chmielewski, Radboud University, The Netherlands
- An analysis of the hardware-friendliness of AMQ data structures for network security
Arish Sateesan, Jo Vliegen and Nele Mentens (imec-COSIC/ES&S, ESAT, KU Leuven, Belgium / LIACS, Leiden University, The Netherlands)
- RemOD: Operational Drift-adaptive Intrusion Detection
Vikas Maurya, Nanda Rani and Sandeep Shukla (IIT Kanpur, India)
16:00- 16:30 Break
16:30-18:00 PAPER SESSION - 3: Hardware security and physical attacks

Chair: Łukasz Chmielewski, Radboud University, The Netherlands
- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles
Tu A. Ngo, Reuben J. Chia, Jonathan Chan, Nandish Chattopadhyay and Anupam Chattopadhyay (NTU Singapore, Singapore)
- Protecting the most significant bits in scalar multiplication algorithms
Estuardo Alpirez Bock, Lukasz Chmielewski and Konstantina Miteloudi (Aalto University, Finland / Masaryk University, Czech Republic / Radboud University, Nijmegen, The Netherlands
- What Do You See? Transforming Fault Injection Target Characterizations
Marina Krček (Delft University of Technology, The Netherlands)
Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe and Mridul Nandi (NTU Singapore, Singapore / ISI Kolkata, India / Silicon Austria Labs, Graz, Austria / University of Hyogo, Kobe
18:00-18:30 High Tea
Dec 11 2022: Day 3
9:00-10:00 PAPER SESSION - 4: Symmetric Cryptography 2


Chair: Nele Mentens, KU Leuven, Belgium
- Bias Cancellation of MixColumns
Subhadeep Banik, Andrea Caforio, Kostas Papagiannopoulos and Francesco Re-gazzoni (Universita della Svizzera Italiana, Lugano, Switzerland / LASEC, Ecole Polytechnique Fédérale de Lausanne, Switzerland / University of Amsterdam, The Netherlands)
- Hardware Implementation of Masked SKINNY SBox with Application to AEAD
Mustafa Khairallah and Shivam Bhasin (NTU Singapore, Singapore / Seagate research, Singapore)
10:00-11:00 KEYNOTE TALK - 4
Title: Building Secure Systems Bottom Up: Hunting down hardware security vulnerabilities
Prof. Jeyavijayan (JV) Rajendran, TAMU, USA
Chair: Stjepan Picek, Radboud University in Nijmegen, the Netherlands
11:00-11:30 Break
11:30- 13:00 PAPER SESSION - 5: Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs


Chair: Stjepan Picek, Radboud University in Nijmegen, the Netherlands
- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems
Ruben Gonzalez and Thom Wiggers (Neodyme AG, Garching, Germany / Radboud University, Nijmegen, The Netherlands)
- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields
Madhurima Mukhopadhyay and Palash Sarkar (IIT Kanpur, India / ISI Kolkata, India)
- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view
Takuro Fukasawa and Yoshifumi Manabe (Kogakuin University, Shinjuku,Tokyo, Japan)
13:00- 14:00 Lunch
14:00- 15:00 KEYNOTE TALK - 5
Title: TBD
Prof. Nele Mentens, KU Leuven, Belgium
Chair: Lejla Batina, Radboud University in Nijmegen, the Netherlands
15:00 - 16:00 PAPER SESSION - 6: Authentication and privacy


Chair: Mainack Mondal, IIT Kharagpur
- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology
Soumyadyuti Ghosh, Soumyajit Dey and Debdeep Mukhopadhyay (IIT Kharagpur, India)
- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentica-tion System with Template Protection using Topology Code for local registration and security enhancement
SrinivasaRao SubramanyaRao (Cybersecurity Researcher and Consultant, Can-berra, Australia)
16:00- 16:30 Break
16:00- 17:30 Poster Session
Poster Chair:
Prof. Chester Rebeiro
16:30-17:30 PAPER SESSION - 7: Side-channel analysis and AI


Chair: Łukasz Chmielewski
- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log
Abhishek Revskar, Mahendra Rathor and Urbi Chatterjee (IIT Kanpur, India)
- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs
Manthan Kojage, Neelofar Hassan and Urbi Chatterjee (IIT Kanpur, India)
- HWGN2: Side-channel Protected NNs through Secure and Private Function Evalua-tion
Mohammad Hashemi, Steffi Roy, Domenic Forte and Fatemeh Ganji (Worcester Polytechnic Institute, MA, USA / University of Florida, Florida, USA)
18:30-19:00 High Tea
19:00 onwards Banquet dinner
Dec 12 2022: Day 4
09:00-10:30 TUTORIAL – 3
Implementing Kyber and Dilithium
Dr. Matthias Kannwischer, Academica Sinica Taiwan
Chair: Lejla Batina, Radboud University in Nijmegen, the Netherlands
10:30-11:00 Break
11:00- 12:30 TUTORIAL – 3 (continued)
Implementing Kyber and Dilithium
Dr. Matthias Kannwischer, Academica Sinica Taiwan
Chair: Lejla Batina, Radboud University in Nijmegen, the Netherlands
12:30- 14:00 Lunch
14:00- 15:30 TUTORIAL – 4
Title: Profiling Side-channel Analysis: From Template Attack to Deep Learning
Prof. Stjepan Picek, Prof. Lejla Batina, Radboud University, The Netherlands
15:30- 16:00 Break
16:00- 17:30 TUTORIAL – 4 (continued)
Title: Profiling Side-channel Analysis: From Template Attack to Deep Learning
Prof. Stjepan Picek, Prof. Lejla Batina, Radboud University, The Netherlands
17:30- 18:00 Concluding Remarks
18:00- 18:30 High Tea