Abstract is missing.
- Computing the Distribution of Differentials over the Non-linear Mapping χJoan Daemen, Alireza Mehrdad, Silvia Mella. 3-21 [doi]
- Light-OCB: Parallel Lightweight Authenticated Cipher with Full SecurityAvik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi. 22-41 [doi]
- MILP Based Differential Attack on Round Reduced WARPManoj Kumar, Tarun Yadav. 42-59 [doi]
- SHELBRS: Location-Based Recommendation Services Using Switchable Homomorphic EncryptionMishel Jain, Priyanka Singh, Balasubramanian Raman. 63-80 [doi]
- On Threat of Hardware Trojan to Post-Quantum Lattice-Based Schemes: A Key Recovery Attack on SABER and BeyondPrasanna Ravi, Suman Deb, Anubhab Baksi, Anupam Chattopadhyay, Shivam Bhasin, Avi Mendelson. 81-103 [doi]
- Safe-Error Attacks on SIKE and CSIDHFabio Campos, Juliane Krämer, Marcel Müller. 104-125 [doi]
- Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODVPushpraj Naik, Urbi Chatterjee. 129-147 [doi]
- Parasite: Mitigating Physical Side-Channel Attacks Against Neural NetworksHervé Chabanne, Jean-Luc Danger, Linda Guiga, Ulrich Kühne. 148-167 [doi]
- Reinforcement Learning-Based Design of Side-Channel CountermeasuresJorai Rijsdijk, Lichao Wu, Guilherme Perin. 168-187 [doi]
- Deep Freezing Attacks on Capacitors and Electronic CircuitsJalil Morris, Obi Nnorom, Anisul Abedin, Ferhat Erata, Jakub Szefer. 188-203 [doi]
- Encrypted SQL Arithmetic Functions Processing for Secure Cloud DatabaseTanusree Parbat, Ayantika Chatterjee. 207-225 [doi]
- Robustness Against Adversarial Attacks Using DimensionalityNandish Chattopadhyay, Subhrojyoti Chatterjee, Anupam Chattopadhyay. 226-241 [doi]
- SoK - Network Intrusion Detection on FPGALaurens Le Jeune, Arish Sateesan, Md Masoom Rabbani, Toon Goedemé, Jo Vliegen, Nele Mentens. 242-261 [doi]