Security, Privacy, and Applied Cryptography Engineering: 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings [1st ed. 2019] 978-3-030-35868-6, 978-3-030-35869-3

This book constitutes the refereed proceedings of the 9th International Conference on Security, Privacy, and Applied Cry

339 73 16MB

English Pages X, 237 [246] Year 2019

Report DMCA / Copyright

DOWNLOAD FILE

Security, Privacy, and Applied Cryptography Engineering: 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings [1st ed. 2019]
 978-3-030-35868-6, 978-3-030-35869-3

Table of contents :
Front Matter ....Pages i-x
Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security (Makoto Nagata)....Pages 1-4
Real Processing-In-Memory with Memristive Memory Processing Unit (Shahar Kvatinsky)....Pages 5-8
Challenges in Deep Learning-Based Profiled Side-Channel Analysis (Stjepan Picek)....Pages 9-12
A Study of Persistent Fault Analysis (Andrea Caforio, Subhadeep Banik)....Pages 13-33
Internal State Recovery Attack on Stream Ciphers: Breaking BIVIUM (Shravani Shahapure, Virendra Sule, R. D. Daruwala)....Pages 34-49
Related-Key Differential Cryptanalysis of Full Round CRAFT (Muhammad ElSheikh, Amr M. Youssef)....Pages 50-66
SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security (Gaëtan Cassiers, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert)....Pages 67-85
One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA (Léo Weissbart, Stjepan Picek, Lejla Batina)....Pages 86-105
An Efficient Parallel Implementation of Impossible-Differential Cryptanalysis for Five-Round AES-128 (Debranjan Pal, Dishank Agrawal, Abhijit Das, Dipanwita Roy Chowdhury)....Pages 106-122
Automated Classification of Web-Application Attacks for Intrusion Detection (Harsh Bhagwani, Rohit Negi, Aneet Kumar Dutta, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla)....Pages 123-141
Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions (Durba Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay)....Pages 142-158
ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch (Vidya Govindan, Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi, Rajat Subhra Chakraborty)....Pages 159-175
Encrypted Classification Using Secure K-Nearest Neighbour Computation (B. Praeep Kumar Reddy, Ayantika Chatterjee)....Pages 176-194
A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices (Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta)....Pages 195-213
Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations (Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty)....Pages 214-230
Back Matter ....Pages 231-237

Polecaj historie