researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Amr M. Youssef
Anish Mathuria
Anupam Chattopadhyay
Bodhisatwa Mazumdar
Debapriya Basu Roy
Debdeep Mukhopadhyay
Dipanwita Roy Chowdhury
Jean-Luc Danger
Mahabir Prasad Jhanwar
Mridul Nandi
Nandish Chattopadhyay
Santanu Sarkar
Shivam Bhasin
Sikhar Patranabis
Somitra Kumar Sanadhya
Stjepan Picek
Subhadeep Banik
Subhamoy Maitra
Sylvain Guilley
Urbi Chatterjee
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
applied
attack
attacks
channel
conference
cryptography
efficient
engineering
fault
india
international
key
privacy
proceedings
secure
security
side
space
using
SPACE (space)
Editions
Publications
Viewing Publication 1 - 100 from 244
2026
Security, Privacy, and Applied Cryptography Engineering - 15th International Conference, SPACE 2025, Guwahati, India, December 16-19, 2025, Proceedings
Chandan Karfa
,
Navid Asadi
,
Anupam Chattopadhyay
, editors,
Volume 16406 of
Lecture Notes in Computer Science
, Springer,
2026.
[doi]
2025
A Custom Entropy Harvester for Consistent Entropy Supply to the /dev/random
Kunal Abhishek
,
Anuyog Chauhan
.
space 2026
:
1-20
[doi]
Efficient Time Share Masking of AES
Subhadeep Banik
,
Francesco Regazzoni 0001
.
space 2026
:
21-40
[doi]
Investigation on the Impact of Practical Fault Model for Commercial Edge Machine Learning Devices
Shivam Bhasin
,
Dirmanto Jap
,
Marina Krcek
,
Stjepan Picek
.
space 2026
:
41-57
[doi]
A New Perspective on the Decomposition in the Jacobian of Small Genus Hyperelliptic Curve
Deepak Bhati
,
Shashank Singh
.
space 2026
:
58-78
[doi]
A Multi-view Contrastive Graph Neural Network Framework for Malware Detection in IoMT Environments
Bhagyasri Bora
,
Saunav Barman
,
Rahul Bardhan
,
Dharitri Brahma
,
Amitava Nag
.
space 2026
:
79-96
[doi]
PAC-Guided Design Strategies for Resilient Priority Arbiter PUFs
Durba Chatterjee
,
Simranjeet Singh
,
Debdeep Mukhopadhyay
,
Farhad Merchant
,
Anupam Chattopadhyay
.
space 2026
:
97-113
[doi]
Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection
Subeen Cho
,
Yulim Hyoung
,
Hagyeong Kim
,
Minjoo Sim
,
Anupam Chattopadhyay
,
Hwajeong Seo
,
HyunJi Kim
.
space 2026
:
114-133
[doi]
GhostWriter: Exploiting GPU-Cache Contention to Steal and Steer Multi-tenant Large-Language-Model Inference
Satyajit Das
,
Sreenath Vijayakumar
.
space 2026
:
134-153
[doi]
Breaking PCB-Chain: A Side Channel Assisted Attack on IoT-Friendly Blockchain Mining
Subhankar Gambhir
,
Vishesh Mishra
,
Urbi Chatterjee
,
Debapriya Basu Roy
.
space 2026
:
154-170
[doi]
Analyzing Non-linear Shift Register Transformations in the Design and Cryptanalysis of Espresso
Anirban Ghatak
,
Anupam Chattopadhyay
,
Ambrish Awasthi
,
Indivar Gupta
.
space 2026
:
171-190
[doi]
MLP is Better than ResNet on ANSSI's Protected AES Implementation on ARM
Akash Gupta
,
S. P. Mishra
,
Atul Prakash
.
space 2026
:
282-297
[doi]
Sample Similarity Based Incremental Clustering: An Effective Methodology for Anomaly Detection in Networks
Arun K
,
V. S. Ardra
,
S. Aji
.
space 2026
:
191-205
[doi]
Addressing Cache Side-Channel Attacks Using Taint-Guided Fine-Grained Computation Offloading in Near-Memory Processing
Simran Preet Kaur
,
Asutosh Kumar Sarma
,
Satanu Maity
,
Manojit Ghose
.
space 2026
:
206-226
[doi]
Security, Privacy, and Applied Cryptography Engineering - 14th International Conference, SPACE 2024, Kottayam, India, December 14-17, 2024, Proceedings
Johann Knechtel
,
Urbi Chatterjee
,
Domenic Forte
, editors,
Volume 15351 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Gradient-Guided Adversarial Patch Attack for Deep Neural Networks
Rishav Kumar
,
Umesh Kashyap
,
Sk Subidh Ali
.
space 2026
:
227-245
[doi]
High Throughput 64-Bit Implementation of SNOW-V Stream Cipher
Kakumani Kushalram
,
Majji Harsha Vardhan
,
Raghvendra Rohit 0001
.
space 2026
:
246-261
[doi]
A Security Analysis of CNN Partitioning Strategies for Distributed Inference at the Edge
Fatemeh Mehrafrooz
,
Roozbeh Siyadatzadeh
,
Nele Mentens
,
Todor P. Stefanov
.
space 2026
:
262-281
[doi]
VulScan-LT: A Lightweight Transformer-Based Software Vulnerability Scanning Tool for Resource-Constrained Edge Devices
Dev Saini
,
Vivek Chaturvedi
,
Muhammad Shafique 0001
.
space 2026
:
298-317
[doi]
Enhanced Hardware Trojan Detection with XGBoost Graph Learning: A Glass Box Approach
C. Sneha
,
M. Nirmala Devi
.
space 2026
:
318-335
[doi]
Hard-to-Find Bugs in Public-Key Cryptographic Software: Classification and Test Methodologies
Matteo Steinbach
,
Johann Großschädl
,
Peter B. Rønne
.
space 2026
:
336-357
[doi]
Secure Secret Sharing Protocol Against Network Data Remanence Side Channel Attacks
Prajwal Thakare
,
Akash Om Trivedi
,
Urbi Chatterjee
.
space 2026
:
358-376
[doi]
Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization
Tarun Yadav
,
Shweta Singh
,
Sudha Yadav
.
space 2026
:
377-406
[doi]
A Keystream Generator Inspired by the Experiment of Drawing Balls with Replacement
Ganesh Yellapu
.
space 2026
:
407-429
[doi]
2024
Security, Privacy, and Applied Cryptography Engineering - 13th International Conference, SPACE 2023, Roorkee, India, December 14-17, 2023, Proceedings
Francesco Regazzoni 0001
,
Bodhisatwa Mazumdar
,
Sri Parameswaran
, editors,
Volume 14412 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Attacks and Countermeasures for Digital Microfluidic Biochips - Extended Abstract
Navajit Singh Baban
,
Prithwish Basu Roy
,
Pauline John
,
Azhar Zam
,
Sukanta Bhattacharjee
,
Yong-Ak Song
,
Ramesh Karri
,
Krishnendu Chakrabarty
.
space 2025
:
1-5
[doi]
SideLink: Exposing NVLink to Covert and Side-Channel Attacks Official Work-in-Progress Paper
Issa Baddour
,
Dip Sankar Banerjee
,
Somitra Kumar Sanadhya
.
space 2025
:
6-15
[doi]
Faster and More Energy-Efficient Equation Solvers over GF(2)
Subhadeep Banik
,
Francesco Regazzoni 0001
.
space 2025
:
16-39
[doi]
Transferability of Evasion Attacks Against FHE Encrypted Inference - Official Work-in-Progress Paper
Reeshav Chowdhury
,
Aman Kumar
,
Vaibhav Dashrath Mohite
,
Ayantika Chatterjee
.
space 2025
:
40-68
[doi]
Security Analysis of ASCON Cipher Under Persistent Faults - Official Work-in-Progress Paper
Madhurima Das
,
Bodhisatwa Mazumdar
.
space 2025
:
69-79
[doi]
Privacy-Preserving Graph-Based Machine Learning with Fully Homomorphic Encryption for Collaborative Anti-money Laundering
Fabrianne Effendi
,
Anupam Chattopadhyay
.
space 2025
:
80-105
[doi]
CoPrIME: Complete Process Isolation Using Memory Encryption - Extended Abstract
Saltanat Firdous
,
Asutosh Brahma
,
Arjun Menon
,
Chester Rebeiro
.
space 2025
:
106-109
[doi]
Online Testing Entropy and Entropy Tests with a Two State Markov Model - Invited Paper
David Johnston
.
space 2025
:
110-128
[doi]
Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning Techniques
Rupesh Raj Karn
,
Ozgur Sinanoglu
.
space 2025
:
149-174
[doi]
High Speed High Assurance Implementations of Multivariate Quadratic Based Signatures - Extended Abstract
Samyuktha M
,
Pallavi Borkar
,
Chester Rebeiro
.
space 2025
:
196-200
[doi]
"There's Always Another Counter": Detecting Micro-Architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting
Upasana Mandal
,
Rupali Kalundia
,
Nimish Mishra
,
Shubhi Shukla
,
Sarani Bhattacharya
,
Debdeep Mukhopadhyay
.
space 2025
:
201-220
[doi]
FPGA-Based Acceleration of Homomorphic Convolution with Plaintext Kernels - Extended Abstract
Rohith George Ninan
,
S. Kala
.
space 2025
:
221-224
[doi]
Post-quantum Multi-client Conjunctive Searchable Symmetric Encryption from Isogenies
Sikhar Patranabis
.
space 2025
:
225-257
[doi]
BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks - Official Work-in-Progress Paper
Yi Hao Puah
,
Tu Anh Ngo
,
Nandish Chattopadhyay
,
Anupam Chattopadhyay
.
space 2025
:
258-276
[doi]
NID-TGN: Spatiotemporal Intrusion Detection System for IoT Networks
Jonna Likith Sai
,
Souptik Majumder
,
Rohit Verma
,
Priyanka Bagade
.
space 2025
:
175-195
[doi]
DLShield: A Defense Approach Against Dirty Label Attacks in Heterogeneous Federated Learning
K. M. Sameera
,
M. Abhinav
,
P. P. Amal
,
T. Babu Abhiram
,
Raj K. Abishek
,
Tomichen Amal
,
P. Anaina
,
P. Vinod 0001
,
Rafidha Rehiman K. A.
,
Mauro Conti
.
space 2025
:
129-148
[doi]
Adversarial Malware Detection - Official Work-in-Progress Paper
Ashish Vishwakarma
,
Umesh Kashyap
,
Sk Subidh Ali
.
space 2025
:
277-286
[doi]
ML Based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON
Tarun Yadav
,
Manoj Kumar
.
space 2025
:
287-316
[doi]
2023
UN-SPLIT: Attacking Split Manufacturing Using Link Prediction in Graph Neural Networks
Lilas Alrahis
,
Likhitha Mankali
,
Satwik Patnaik
,
Abhrajit Sengupta
,
Johann Knechtel
,
Ozgur Sinanoglu
.
space 2024
:
197-213
[doi]
Spliced Region Detection and Localization in Digital Images Based on CNN Learning Guided by Color Transitions and Surface Texture
Debjit Das
,
Ranit Das
,
Ruchira Naskar
.
space 2024
:
185-196
[doi]
Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems
Thanh Xuan Khuc
,
Anh The Ta
,
Willy Susilo
,
Dung Hoang Duong
,
Fuchun Guo
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
.
space 2024
:
214-241
[doi]
Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme
Ramakant Kumar
,
Sahadeo Padhye
,
Swati Rawal
.
space 2024
:
86-91
[doi]
On the Masking-Friendly Designs for Post-quantum Cryptography
Suparna Kundu
,
Angshuman Karmakar
,
Ingrid Verbauwhede
.
space 2024
:
162-184
[doi]
Zero-Knowledge Proofs for SIDH Variants with Masked Degree or Torsion
Youcef Mokrani
,
David Jao
.
space 2024
:
48-65
[doi]
An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation
Togdé Ngarenon
,
Augustin P. Sarr
.
space 2024
:
117-138
[doi]
Cryptanalysis with Countermeasure on the SIS Based Signature Scheme
Komal Pursharthi
,
Dheerendra Mishra
.
space 2024
:
92-100
[doi]
"We Must Protect the Transformers": Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models
Rohit Raj
,
Biplab Roy
,
Abir Das
,
Mainack Mondal
.
space 2024
:
242-260
[doi]
Post-quantum DNSSEC over UDP via QNAME-Based Fragmentation
Aditya Singh Rawat
,
Mahabir Prasad Jhanwar
.
space 2024
:
66-85
[doi]
Results on the Key Space of Group-Ring NTRU: The Case of the Dihedral Group
Ali Raya
,
Vikas Kumar
,
Sugata Gangopadhyay
,
Aditi Kar Gangopadhyay
.
space 2024
:
1-19
[doi]
Vulnerability of Dynamic Masking in Test Compression
Yogendra Sao
,
Debanka Giri
,
Soham Saha
,
Sk Subidh Ali
.
space 2024
:
101-116
[doi]
Token Open Secure and Post-quantum Updatable Encryption Based on MLWE
Yang Song
,
Haiying Gao
,
Keshuo Sun
,
Chao Ma 0016
.
space 2024
:
20-47
[doi]
High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA
Arnaud Varillon
,
Laurent Sauvage
,
Jean-Luc Danger
.
space 2024
:
139-161
[doi]
2022
Big Brother Is Watching You: A Closer Look at Backdoor Construction
Anubhab Baksi
,
Arghya Bhattacharjee
,
Jakub Breier
,
Takanori Isobe 0001
,
Mridul Nandi
.
space 2022
:
81-96
[doi]
Bias Cancellation of MixColumns
Subhadeep Banik
,
Andrea Caforio
,
Kostas Papagiannopoulos
,
Francesco Regazzoni 0001
.
space 2022
:
70-80
[doi]
Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings
Lejla Batina
,
Stjepan Picek
,
Mainack Mondal
, editors,
Volume 13162 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings
Lejla Batina
,
Stjepan Picek
,
Mainack Mondal
, editors,
Volume 13783 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
Protecting the Most Significant Bits in Scalar Multiplication Algorithms
Estuardo Alpirez Bock
,
Lukasz Chmielewski
,
Konstantina Miteloudi
.
space 2022
:
118-137
[doi]
Card-Based Zero-Knowledge Proof for the Nearest Neighbor Property: Zero-Knowledge Proof of ABC End View
Takuro Fukasawa
,
Yoshifumi Manabe
.
space 2022
:
147-161
[doi]
SMarT: A SMT Based Privacy Preserving Smart Meter Streaming Methodology
Soumyadyuti Ghosh
,
Soumyajit Dey
,
Debdeep Mukhopadhyay
.
space 2022
:
267-286
[doi]
KEMTLS vs. Post-quantum TLS: Performance on Embedded Systems
Ruben Gonzalez
,
Thom Wiggers
.
space 2022
:
99-117
[doi]
2: Side-Channel Protected NNs Through Secure and Private Function Evaluation
Mohammad Hashemi
,
Steffi Roy
,
Domenic Forte
,
Fatemeh Ganji
.
space 2022
:
225-248
[doi]
Hardware Implementation of Masked SKINNY SBox with Application to AEAD
Mustafa Khairallah
,
Shivam Bhasin
.
space 2022
:
50-69
[doi]
Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs
Manthan Kojage
,
Neelofar Hassan
,
Urbi Chatterjee
.
space 2022
:
204-224
[doi]
What Do You See? Transforming Fault Injection Target Characterizations
Marina Krcek
.
space 2022
:
165-184
[doi]
RemOD: Operational Drift-Adaptive Intrusion Detection
Vikas Maurya
,
Nanda Rani
,
Sandeep Kumar Shukla
.
space 2022
:
314-333
[doi]
Combining Montgomery Multiplication with Tag Tracing for the Pollard Rho Algorithm in Prime Order Fields
Madhurima Mukhopadhyay
,
Palash Sarkar 0001
.
space 2022
:
138-146
[doi]
How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles
Tu Anh Ngo
,
Reuben Jon Chia
,
Jonathan Chan
,
Nandish Chattopadhyay
,
Anupam Chattopadhyay
.
space 2022
:
249-263
[doi]
Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log
Abhishek Revskar
,
Mahendra Rathor
,
Urbi Chatterjee
.
space 2022
:
185-203
[doi]
Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers
Rajat Sadhukhan
,
Anirban Chakraborty
,
Nilanjan Datta
,
Sikhar Patranabis
,
Debdeep Mukhopadhyay
.
space 2022
:
28-49
[doi]
An Analysis of the Hardware-Friendliness of AMQ Data Structures for Network Security
Arish Sateesan
,
Jo Vliegen
,
Nele Mentens
.
space 2022
:
287-313
[doi]
A Short Note on a Paper Titled: A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection Using Topology Code for Local Registration and Security Enhancement
SrinivasaRao SubramanyaRao
.
space 2022
:
334-341
[doi]
Modeling Large S-box in MILP and a (Related-Key) Differential Attack on Full Round PIPO-64/128
Tarun Yadav
,
Manoj Kumar
.
space 2022
:
3-27
[doi]
2021
Safe-Error Attacks on SIKE and CSIDH
Fabio Campos
,
Juliane Krämer
,
Marcel Müller
.
space 2022
:
104-125
[doi]
Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks
Hervé Chabanne
,
Jean-Luc Danger
,
Linda Guiga
,
Ulrich Kühne
.
space 2022
:
148-167
[doi]
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
Avik Chakraborti
,
Nilanjan Datta
,
Ashwin Jha
,
Cuauhtemoc Mancillas-López
,
Mridul Nandi
.
space 2022
:
22-41
[doi]
Robustness Against Adversarial Attacks Using Dimensionality
Nandish Chattopadhyay
,
Subhrojyoti Chatterjee
,
Anupam Chattopadhyay
.
space 2022
:
226-241
[doi]
Computing the Distribution of Differentials over the Non-linear Mapping χ
Joan Daemen
,
Alireza Mehrdad
,
Silvia Mella
.
space 2022
:
3-21
[doi]
SHELBRS: Location-Based Recommendation Services Using Switchable Homomorphic Encryption
Mishel Jain
,
Priyanka Singh
,
Balasubramanian Raman
.
space 2022
:
63-80
[doi]
SoK - Network Intrusion Detection on FPGA
Laurens Le Jeune
,
Arish Sateesan
,
Md Masoom Rabbani
,
Toon Goedemé
,
Jo Vliegen
,
Nele Mentens
.
space 2022
:
242-261
[doi]
MILP Based Differential Attack on Round Reduced WARP
Manoj Kumar
,
Tarun Yadav
.
space 2022
:
42-59
[doi]
Deep Freezing Attacks on Capacitors and Electronic Circuits
Jalil Morris
,
Obi Nnorom
,
Anisul Abedin
,
Ferhat Erata
,
Jakub Szefer
.
space 2022
:
188-203
[doi]
Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV
Pushpraj Naik
,
Urbi Chatterjee
.
space 2022
:
129-147
[doi]
Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database
Tanusree Parbat
,
Ayantika Chatterjee
.
space 2022
:
207-225
[doi]
On Threat of Hardware Trojan to Post-Quantum Lattice-Based Schemes: A Key Recovery Attack on SABER and Beyond
Prasanna Ravi
,
Suman Deb
,
Anubhab Baksi
,
Anupam Chattopadhyay
,
Shivam Bhasin
,
Avi Mendelson
.
space 2022
:
81-103
[doi]
Reinforcement Learning-Based Design of Side-Channel Countermeasures
Jorai Rijsdijk
,
Lichao Wu
,
Guilherme Perin
.
space 2022
:
168-187
[doi]
2020
Fiat-Shamir with Aborts: From Identification Schemes to Linkable Ring Signatures
Dipayan Das 0001
.
space 2020
:
167-187
[doi]
Cryptographically Secure Multi-tenant Provisioning of FPGAs
Arnab Bag
,
Sikhar Patranabis
,
Debapriya Basu Roy
,
Debdeep Mukhopadhyay
.
space 2020
:
208-225
[doi]
Re-markable: Stealing Watermarked Neural Networks Through Synthesis
Nandish Chattopadhyay
,
Chua Sheng Yang Viroy
,
Anupam Chattopadhyay
.
space 2020
:
46-65
[doi]
Quantum Resource Estimates of Grover's Key Search on ARIA
Amit Kumar Chauhan
,
Somitra Kumar Sanadhya
.
space 2020
:
238-258
[doi]
HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption
Ganeshsai Garikipati
,
Roshani
,
Anish Mathuria
,
Priyanka Singh
.
space 2020
:
147-166
[doi]
ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit Permutation Based Ciphers with a Case Study on GIFT
Priyanka Joshi
,
Bodhisatwa Mazumdar
.
space 2020
:
101-122
[doi]
A Forensic Technique to Detect Copy-Move Forgery Based on Image Statistics
Ayush Nirwal
,
Raghav Khandelwal
,
Smit Patel
,
Priyanka Singh
.
space 2020
:
86-98
[doi]
tPAKE: Typo-Tolerant Password-Authenticated Key Exchange
Thitikorn Pongmorrakot
,
Rahul Chatterjee 0001
.
space 2020
:
3-24
[doi]
On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4
Prasanna Ravi
,
Romain Poussier
,
Shivam Bhasin
,
Anupam Chattopadhyay
.
space 2020
:
123-146
[doi]
PAS-TA-U: PASsword-Based Threshold Authentication with Password Update
Rachit Rawat
,
Mahabir Prasad Jhanwar
.
space 2020
:
25-45
[doi]
Sign in
or
sign up
to see more results.