Abstract is missing.
- tPAKE: Typo-Tolerant Password-Authenticated Key ExchangeThitikorn Pongmorrakot, Rahul Chatterjee 0001. 3-24 [doi]
- PAS-TA-U: PASsword-Based Threshold Authentication with Password UpdateRachit Rawat, Mahabir Prasad Jhanwar. 25-45 [doi]
- Re-markable: Stealing Watermarked Neural Networks Through SynthesisNandish Chattopadhyay, Chua Sheng Yang Viroy, Anupam Chattopadhyay. 46-65 [doi]
- Robust Adaptive Cloud Intrusion Detection System Using Advanced Deep Reinforcement LearningKamalakanta Sethi, Rahul Kumar, Dinesh Mohanty, Padmalochan Bera. 66-85 [doi]
- A Forensic Technique to Detect Copy-Move Forgery Based on Image StatisticsAyush Nirwal, Raghav Khandelwal, Smit Patel, Priyanka Singh. 86-98 [doi]
- ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit Permutation Based Ciphers with a Case Study on GIFTPriyanka Joshi, Bodhisatwa Mazumdar. 101-122 [doi]
- On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4Prasanna Ravi, Romain Poussier, Shivam Bhasin, Anupam Chattopadhyay. 123-146 [doi]
- HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic EncryptionGaneshsai Garikipati, Roshani, Anish Mathuria, Priyanka Singh. 147-166 [doi]
- Fiat-Shamir with Aborts: From Identification Schemes to Linkable Ring SignaturesDipayan Das 0001. 167-187 [doi]
- An Insecurity Study of Ethereum Smart ContractsBishwas C. Gupta, Nitesh Kumar, Anand Handa, Sandeep K. Shukla. 188-207 [doi]
- Cryptographically Secure Multi-tenant Provisioning of FPGAsArnab Bag, Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay. 208-225 [doi]
- Experimental Results on Higher-Order Differential Spectra of 6 and 8-bit Invertible S-BoxesSubhamoy Maitra, Bimal Mandal, Manmatha Roy, Deng Tang. 226-237 [doi]
- Quantum Resource Estimates of Grover's Key Search on ARIAAmit Kumar Chauhan, Somitra Kumar Sanadhya. 238-258 [doi]