Accepted Papers

Secure realization of lightweight block cipher: A case study using GIFT
Varsha Satheesh and Dillibabu Shanmugam         
 
Addressing Side-Channel Vulnerabilities in the Discrete Ziggurat Sampler
Seamus Brannigan, Ciara Rafferty, Ayesha Khalid and Maire O'Neil
 
Correlation Power Analysis on KASUMI: Attack and Countermeasure
Devansh Gupta, Somanath Tripathy and Bodhisatwa Mazumdar
 
On the Performance of Convolutional Neural Networks for Side-channel Analysis
Stjepan Picek, Ioannis Petros Samiotis, Jaehun Kim, Annelie Heuser, Shivam Bhasin and Axel Legay            
 
Exploiting Security Vulnerabilities in Intermittent Computing
Archanaa Santhana Krishnan and Patrick Schaumon
 
Differential Fault Attack on SKINNY Block Cipher
Navid Vafaei, Nasour Bagheri, Sayandeep Saha and Debdeep Mukhopadhyay
 
d-MUL: Optimizing and Implementing a Multidimensional Scalar Multiplication Algorithm over Elliptic Curves
Huseyin Hisil, Aaron Hutchinson and Koray Karabina
 
NEON SIKE: Supersingular Isogeny Key Encapsulation on ARMv7
Amir Jalali, Reza Azarderakhsh and Mehran Mozaffari Kermani
 
Template-based Fault Injection Analysis of Block Ciphers
Ashrujit Ghoshal, Sikhar Patranabis and Debdeep Mukhopadhyay              
 
A Machine Vision Attack Model on Image based CAPTCHAs Challenge: Large Scale Evaluation
Ajeet Singh, Vikas Tiwari and Appala Naidu Tentu             
 
EdSIDH: Supersingular Isogeny Diffie-Hellman Key Exchange on Edwards Curves
Reza Azarderakhsh, David Jao, Brian Koziel and Elena Bakos Lang               
 
An observation of non-randomness in the Grain family of stream ciphers with reduced initialization round
Deepak Kumar Dalai and Dibyendu Roy