default search action
9th SPACE 2019: Gandhinagar, India
- Shivam Bhasin, Avi Mendelson, Mridul Nandi:
Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Gandhinagar, India, December 3-7, 2019, Proceedings. Lecture Notes in Computer Science 11947, Springer 2019, ISBN 978-3-030-35868-6 - Makoto Nagata:
Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security - Invited Paper. 1-4 - Shahar Kvatinsky:
Real Processing-In-Memory with Memristive Memory Processing Unit. 5-8 - Stjepan Picek:
Challenges in Deep Learning-Based Profiled Side-Channel Analysis. 9-12 - Andrea Caforio, Subhadeep Banik:
A Study of Persistent Fault Analysis. 13-33 - Shravani Shahapure, Virendra Sule, Rohin D. Daruwala:
Internal State Recovery Attack on Stream Ciphers: Breaking BIVIUM. 34-49 - Muhammad ElSheikh, Amr M. Youssef:
Related-Key Differential Cryptanalysis of Full Round CRAFT. 50-66 - Gaëtan Cassiers, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security. 67-85 - Leo Weissbart, Stjepan Picek, Lejla Batina:
One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA. 86-105 - Debranjan Pal, Dishank Agrawal, Abhijit Das, Dipanwita Roy Chowdhury:
An Efficient Parallel Implementation of Impossible-Differential Cryptanalysis for Five-Round AES-128. 106-122 - Harsh Bhagwani, Rohit Negi, Aneet Kumar Dutta, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla:
Automated Classification of Web-Application Attacks for Intrusion Detection. 123-141 - Durba Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay:
Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions. 142-158 - Vidya Govindan, Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi, Rajat Subhra Chakraborty:
ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch. 159-175 - B. Pradeep Kumar Reddy, Ayantika Chatterjee:
Encrypted Classification Using Secure K-Nearest Neighbour Computation. 176-194 - Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta:
A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices. 195-213 - Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. 214-230
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.