


default search action
15th SPACE 2025: Guwahati, India
- Chandan Karfa

, Navid Asadi, Anupam Chattopadhyay
:
Security, Privacy, and Applied Cryptography Engineering - 15th International Conference, SPACE 2025, Guwahati, India, December 16-19, 2025, Proceedings. Lecture Notes in Computer Science 16406, Springer 2026, ISBN 978-3-032-16341-7 - Kunal Abhishek

, Anuyog Chauhan:
A Custom Entropy Harvester for Consistent Entropy Supply to the /dev/random. 1-20 - Subhadeep Banik, Francesco Regazzoni:

Efficient Time Share Masking of AES. 21-40 - Shivam Bhasin, Dirmanto Jap, Marina Krcek, Stjepan Picek:

Investigation on the Impact of Practical Fault Model for Commercial Edge Machine Learning Devices. 41-57 - Deepak Bhati, Shashank Singh

:
A New Perspective on the Decomposition in the Jacobian of Small Genus Hyperelliptic Curve. 58-78 - Bhagyasri Bora

, Saunav Barman
, Rahul Bardhan
, Dharitri Brahma, Amitava Nag
:
A Multi-view Contrastive Graph Neural Network Framework for Malware Detection in IoMT Environments. 79-96 - Durba Chatterjee

, Simranjeet Singh
, Debdeep Mukhopadhyay
, Farhad Merchant
, Anupam Chattopadhyay
:
PAC-Guided Design Strategies for Resilient Priority Arbiter PUFs. 97-113 - Subeen Cho, Yulim Hyoung, Hagyeong Kim, Minjoo Sim, Anupam Chattopadhyay, Hwajeong Seo, Hyunji Kim:

Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection. 114-133 - Satyajit Das

, Sreenath Vijayakumar
:
GhostWriter: Exploiting GPU-Cache Contention to Steal and Steer Multi-tenant Large-Language-Model Inference. 134-153 - Subhankar Gambhir, Vishesh Mishra, Urbi Chatterjee, Debapriya Basu Roy:

Breaking PCB-Chain: A Side Channel Assisted Attack on IoT-Friendly Blockchain Mining. 154-170 - Anirban Ghatak

, Anupam Chattopadhyay, Ambrish Awasthi
, Indivar Gupta:
Analyzing Non-linear Shift Register Transformations in the Design and Cryptanalysis of Espresso. 171-190 - Arun K

, V. S. Ardra, S. Aji
:
Sample Similarity Based Incremental Clustering: An Effective Methodology for Anomaly Detection in Networks. 191-205 - Simran Preet Kaur, Asutosh Kumar Sarma, Satanu Maity, Manojit Ghose:

Addressing Cache Side-Channel Attacks Using Taint-Guided Fine-Grained Computation Offloading in Near-Memory Processing. 206-226 - Rishav Kumar, Umesh Kashyap, Sk Subidh Ali:

Gradient-Guided Adversarial Patch Attack for Deep Neural Networks. 227-245 - Kakumani Kushalram, Majji Harsha Vardhan, Raghvendra Rohit

:
High Throughput 64-Bit Implementation of SNOW-V Stream Cipher. 246-261 - Fatemeh Mehrafrooz, Roozbeh Siyadatzadeh, Nele Mentens, Todor P. Stefanov:

A Security Analysis of CNN Partitioning Strategies for Distributed Inference at the Edge. 262-281 - Akash Gupta, S. P. Mishra, Atul Prakash:

MLP is Better than ResNet on ANSSI's Protected AES Implementation on ARM. 282-297 - Dev Saini, Vivek Chaturvedi

, Muhammad Shafique
:
VulScan-LT: A Lightweight Transformer-Based Software Vulnerability Scanning Tool for Resource-Constrained Edge Devices. 298-317 - C. Sneha, M. Nirmala Devi:

Enhanced Hardware Trojan Detection with XGBoost Graph Learning: A Glass Box Approach. 318-335 - Matteo Steinbach, Johann Großschädl, Peter B. Rønne:

Hard-to-Find Bugs in Public-Key Cryptographic Software: Classification and Test Methodologies. 336-357 - Prajwal Thakare, Akash Om Trivedi, Urbi Chatterjee:

Secure Secret Sharing Protocol Against Network Data Remanence Side Channel Attacks. 358-376 - Tarun Yadav

, Shweta Singh, Sudha Yadav
:
Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization. 377-406 - Ganesh Yellapu:

A Keystream Generator Inspired by the Experiment of Drawing Balls with Replacement. 407-429

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














