Abstract is missing.
- An Observation of Non-randomness in the Grain Family of Stream Ciphers with Reduced Initialization RoundDeepak Kumar Dalai, Dibyendu Roy 0001. 1-20 [doi]
- Template-Based Fault Injection Analysis of Block CiphersAshrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay. 21-36 [doi]
- NEON SIKE: Supersingular Isogeny Key Encapsulation on ARMv7Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani. 37-51 [doi]
- A Machine Vision Attack Model on Image Based CAPTCHAs Challenge: Large Scale EvaluationAjeet Singh, Vikas Tiwari, Appala Naidu Tentu. 52-64 [doi]
- Addressing Side-Channel Vulnerabilities in the Discrete Ziggurat SamplerSéamus Brannigan, Máire O'Neill, Ayesha Khalid, Ciara Rafferty. 65-84 [doi]
- Secure Realization of Lightweight Block Cipher: A Case Study Using GIFTVarsha Satheesh, Dillibabu Shanmugam. 85-103 [doi]
- Exploiting Security Vulnerabilities in Intermittent ComputingArchanaa S. Krishnan, Patrick Schaumont. 104-124 [doi]
- EdSIDH: Supersingular Isogeny Diffie-Hellman Key Exchange on Edwards CurvesReza Azarderakhsh, Elena Bakos Lang, David Jao, Brian Koziel. 125-141 [doi]
- Correlation Power Analysis on KASUMI: Attack and CountermeasureDevansh Gupta, Somanath Tripathy, Bodhisatwa Mazumdar. 142-156 [doi]
- On the Performance of Convolutional Neural Networks for Side-Channel AnalysisStjepan Picek, Ioannis Petros Samiotis, Jaehun Kim, Annelie Heuser, Shivam Bhasin, Axel Legay. 157-176 [doi]
- Differential Fault Attack on SKINNY Block CipherNavid Vafaei, Nasour Bagheri, Sayandeep Saha, Debdeep Mukhopadhyay. 177-197 [doi]
- d-MUL: Optimizing and Implementing a Multidimensional Scalar Multiplication Algorithm over Elliptic CurvesHüseyin Hisil, Aaron Hutchinson, Koray Karabina. 198-217 [doi]