Abstract is missing.
- A Custom Entropy Harvester for Consistent Entropy Supply to the /dev/randomKunal Abhishek, Anuyog Chauhan. 1-20 [doi]
- Efficient Time Share Masking of AESSubhadeep Banik, Francesco Regazzoni 0001. 21-40 [doi]
- Investigation on the Impact of Practical Fault Model for Commercial Edge Machine Learning DevicesShivam Bhasin, Dirmanto Jap, Marina Krcek, Stjepan Picek. 41-57 [doi]
- A New Perspective on the Decomposition in the Jacobian of Small Genus Hyperelliptic CurveDeepak Bhati, Shashank Singh. 58-78 [doi]
- A Multi-view Contrastive Graph Neural Network Framework for Malware Detection in IoMT EnvironmentsBhagyasri Bora, Saunav Barman, Rahul Bardhan, Dharitri Brahma, Amitava Nag. 79-96 [doi]
- PAC-Guided Design Strategies for Resilient Priority Arbiter PUFsDurba Chatterjee, Simranjeet Singh, Debdeep Mukhopadhyay, Farhad Merchant, Anupam Chattopadhyay. 97-113 [doi]
- Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet InspectionSubeen Cho, Yulim Hyoung, Hagyeong Kim, Minjoo Sim, Anupam Chattopadhyay, Hwajeong Seo, HyunJi Kim. 114-133 [doi]
- GhostWriter: Exploiting GPU-Cache Contention to Steal and Steer Multi-tenant Large-Language-Model InferenceSatyajit Das, Sreenath Vijayakumar. 134-153 [doi]
- Breaking PCB-Chain: A Side Channel Assisted Attack on IoT-Friendly Blockchain MiningSubhankar Gambhir, Vishesh Mishra, Urbi Chatterjee, Debapriya Basu Roy. 154-170 [doi]
- Analyzing Non-linear Shift Register Transformations in the Design and Cryptanalysis of EspressoAnirban Ghatak, Anupam Chattopadhyay, Ambrish Awasthi, Indivar Gupta. 171-190 [doi]
- Sample Similarity Based Incremental Clustering: An Effective Methodology for Anomaly Detection in NetworksArun K, V. S. Ardra, S. Aji. 191-205 [doi]
- Addressing Cache Side-Channel Attacks Using Taint-Guided Fine-Grained Computation Offloading in Near-Memory ProcessingSimran Preet Kaur, Asutosh Kumar Sarma, Satanu Maity, Manojit Ghose. 206-226 [doi]
- Gradient-Guided Adversarial Patch Attack for Deep Neural NetworksRishav Kumar, Umesh Kashyap, Sk Subidh Ali. 227-245 [doi]
- High Throughput 64-Bit Implementation of SNOW-V Stream CipherKakumani Kushalram, Majji Harsha Vardhan, Raghvendra Rohit 0001. 246-261 [doi]
- A Security Analysis of CNN Partitioning Strategies for Distributed Inference at the EdgeFatemeh Mehrafrooz, Roozbeh Siyadatzadeh, Nele Mentens, Todor P. Stefanov. 262-281 [doi]
- MLP is Better than ResNet on ANSSI's Protected AES Implementation on ARMAkash Gupta, S. P. Mishra, Atul Prakash. 282-297 [doi]
- VulScan-LT: A Lightweight Transformer-Based Software Vulnerability Scanning Tool for Resource-Constrained Edge DevicesDev Saini, Vivek Chaturvedi, Muhammad Shafique 0001. 298-317 [doi]
- Enhanced Hardware Trojan Detection with XGBoost Graph Learning: A Glass Box ApproachC. Sneha, M. Nirmala Devi. 318-335 [doi]
- Hard-to-Find Bugs in Public-Key Cryptographic Software: Classification and Test MethodologiesMatteo Steinbach, Johann Großschädl, Peter B. Rønne. 336-357 [doi]
- Secure Secret Sharing Protocol Against Network Data Remanence Side Channel AttacksPrajwal Thakare, Akash Om Trivedi, Urbi Chatterjee. 358-376 [doi]
- Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth OptimizationTarun Yadav, Shweta Singh, Sudha Yadav. 377-406 [doi]
- A Keystream Generator Inspired by the Experiment of Drawing Balls with ReplacementGanesh Yellapu. 407-429 [doi]