


default search action
11th SPACE 2021: Kolkata, India
- Lejla Batina
, Stjepan Picek
, Mainack Mondal
:
Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings. Lecture Notes in Computer Science 13162, Springer 2022, ISBN 978-3-030-95084-2
Symmetric Cryptography
- Joan Daemen, Alireza Mehrdad
, Silvia Mella:
Computing the Distribution of Differentials over the Non-linear Mapping χ. 3-21 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi:
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security. 22-41 - Manoj Kumar
, Tarun Yadav
:
MILP Based Differential Attack on Round Reduced WARP. 42-59
Post-Quantum Cryptography and Homomorphic Encryption
- Mishel Jain, Priyanka Singh
, Balasubramanian Raman:
SHELBRS: Location-Based Recommendation Services Using Switchable Homomorphic Encryption. 63-80 - Prasanna Ravi, Suman Deb, Anubhab Baksi, Anupam Chattopadhyay, Shivam Bhasin, Avi Mendelson:
On Threat of Hardware Trojan to Post-Quantum Lattice-Based Schemes: A Key Recovery Attack on SABER and Beyond. 81-103 - Fabio Campos
, Juliane Krämer, Marcel Müller:
Safe-Error Attacks on SIKE and CSIDH. 104-125
Hardware Security and Side-Channel Attacks
- Pushpraj Naik, Urbi Chatterjee
:
Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV. 129-147 - Hervé Chabanne, Jean-Luc Danger, Linda Guiga, Ulrich Kühne:
Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks. 148-167 - Jorai Rijsdijk, Lichao Wu, Guilherme Perin:
Reinforcement Learning-Based Design of Side-Channel Countermeasures. 168-187 - Jalil Morris, Obi Nnorom, Anisul Abedin, Ferhat Erata
, Jakub Szefer:
Deep Freezing Attacks on Capacitors and Electronic Circuits. 188-203
AI and Cloud Security
- Tanusree Parbat
, Ayantika Chatterjee
:
Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database. 207-225 - Nandish Chattopadhyay, Subhrojyoti Chatterjee, Anupam Chattopadhyay:
Robustness Against Adversarial Attacks Using Dimensionality. 226-241 - Laurens Le Jeune
, Arish Sateesan
, Md Masoom Rabbani, Toon Goedemé
, Jo Vliegen, Nele Mentens
:
SoK - Network Intrusion Detection on FPGA. 242-261

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.