SPACE 2016

Accepted Papers

The following 17 papers out of a total of 62 submissions were accepted at SPACE 2016 after a competitive peer review process and active discussions among the program committee members.

Malware Characterization using Windows API Call Sequences (Abstract)
Sanchit Gupta1, Sarvjeet Kaur1 and Harshit Sharma2.
1 DRDO, India, 2 NIIT, India.
A Methodology for the Characterisation of Leakages in Combinatorial Logic (Abstract)
Marco Martinoli1 and Guido Bertoni2.
1 University of Bristol, United Kingdom, 2 STMicroelectronics, Italy.
A new hope on ARM Cortex-M (Abstract)
Erdem Alkim1, Philipp Jakubeit2 and Peter Schwabe2.
1 Ege University, Turkey, 2 Radboud University, Netherlands.
Partially homomorphic encryption schemes over finite fields (Abstract)
Jian Liu1, Sihem Mesnager2 and Lusheng Chen1.
1 Nankai University, China, 2 University of Paris VIII, France.
Predictive Aging of Reliability of two Delay PUFs (Abstract)
Naghmeh Karimi1, Jean-Luc Danger2, Florent Lozac'H3 and Sylvain Guilley2.
1 Rutgers University, USA, 2 Institut Telecom/Telecom ParisTech, CNRS/LTCI, France, 3 Secure-IC, France.
Light Weight Key Establishment Scheme for Wireless Sensor Networks (Abstract)
Jilna Payingat and Deepthi P.P..
NIT Calicut, India.
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs (Abstract)
Amine Mrabet1, Nadia El-Mrabet2, Ronan Lashermes3, Jean Baptiste Rigaud2, Belgacem Bouallegue4, Sihem Mesnager1 and Mohsen Machhout5.
1 University of Paris VIII, France, 2 SAS-CMP-emse, France, 3 LHS-PEC TAMIS INRIA-Rennes, France, 4 King Khalid University, Saudi Arabia, 5 University of Monastir, Tunisia.
Cheap and Cheerful: A Low-Cost Digital Sensor for Detecting Laser Fault Injection Attacks (Abstract)
Wei He, Jakub Breier and Shivam Bhasin.
Nanyang Technological University, Singapore.
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE (Abstract)
Selvam Ravikumar, Dillibabu Shanmugam, Annadurai Suganya and Jothi Rangasamy.
Society for Electronic Transactions and Security, India (SETS)
Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 nm FPGA (Abstract)
Wei He, Jakub Breier, Shivam Bhasin, Dirmanto Jap, Hock Guan Ong and Chee Lip Gan.
Nanyang Technological University, Singapore.
Solving binary MQ with Grover's algorithm (Abstract)
Peter Schwabe and Bas Westerbaan.
Radboud Universiteit Nijmegen, Netherlands.
Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers (Abstract)
Dina Kamel, Guerric de Streel, Santos Merino Del Pozo, Kashif Nawaz, Francois-Xavier Standaert, Denis Flandre and David Bol.
Universite Catholique de Louvain, Belgium (UCL).
Breaking Kalyna with Side Channel Attacks (Abstract)
Stephane Fernandes Medeiros, Francois Gerard, Nikita Veshchikov, Liran Lerman and Olivier Markowitch.
Universite Libre de Bruxelles, Belgium (ULB).
Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ (Abstract)
Dhiman Saha, Sourya Kakarla, Srinath Mandava and Dipanwita Roy Chowdhury.
IIT Kharagpur, India.
VMI based Automated Real-Time Malware Detector for Virtualized Cloud Environment (Abstract)
Ajay Kumara M A and Jaidhar C D
NIT Karnataka, India.
Fault Based Almost Universal Forgeries on CLOC and SILC (Abstract)
Debapriya Basu Roy1, Avik Chakraborti2, Donghoon Chang3, S V Dilip Kumar1, Debdeep Mukhopadhyay1 and Mridul Nandi2.
1 IIT Kharagpur, India, 2 ISI Kolkata, India, 3 IIIT Delhi, India.
Exploiting the Leakage: Analysis of some Authenticated Encryption schemes (Abstract)
Donghoon Chang, Amit Kumar Chauhan, Naina Gupta, Arpan Jati and Somitra Kumar Sanadhya.
IIIT Delhi, India.

SPACE 2016 Home