Abstract is missing.
- Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security - Invited PaperMakoto Nagata. 1-4 [doi]
- Real Processing-In-Memory with Memristive Memory Processing UnitShahar Kvatinsky. 5-8 [doi]
- Challenges in Deep Learning-Based Profiled Side-Channel AnalysisStjepan Picek. 9-12 [doi]
- A Study of Persistent Fault AnalysisAndrea Caforio, Subhadeep Banik. 13-33 [doi]
- Internal State Recovery Attack on Stream Ciphers: Breaking BIVIUMShravani Shahapure, Virendra Sule, Rohin D. Daruwala. 34-49 [doi]
- Related-Key Differential Cryptanalysis of Full Round CRAFTMuhammad ElSheikh, Amr M. Youssef. 50-66 [doi]
- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday SecurityGaëtan Cassiers, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert. 67-85 [doi]
- One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSALeo Weissbart, Stjepan Picek, Lejla Batina. 86-105 [doi]
- An Efficient Parallel Implementation of Impossible-Differential Cryptanalysis for Five-Round AES-128Debranjan Pal, Dishank Agrawal, Abhijit Das 0004, Dipanwita Roy Chowdhury. 106-122 [doi]
- Automated Classification of Web-Application Attacks for Intrusion DetectionHarsh Bhagwani, Rohit Negi, Aneet Kumar Dutta, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla. 123-141 [doi]
- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean FunctionsDurba Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay. 142-158 [doi]
- ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet SwitchVidya Govindan, Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi, Rajat Subhra Chakraborty. 159-175 [doi]
- Encrypted Classification Using Secure K-Nearest Neighbour ComputationB. Praeep Kumar Reddy, Ayantika Chatterjee. 176-194 [doi]
- A Few Negative Results on Constructions of MDS Matrices Using Low XOR MatricesKishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta. 195-213 [doi]
- Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware ImplementationsKrishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty. 214-230 [doi]