ebook img

Security, Privacy, and Applied Cryptography Engineering. 12th International Conference, SPACE 2022 Jaipur, India, December 9–12, 2022 Proceedings PDF

346 Pages·2022·30.149 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security, Privacy, and Applied Cryptography Engineering. 12th International Conference, SPACE 2022 Jaipur, India, December 9–12, 2022 Proceedings

Lejla Batina Stjepan Picek Mainack Mondal (Eds.) Security, Privacy, and 3 8 7 Applied Cryptography 3 1 S C Engineering N L 12th International Conference, SPACE 2022 Jaipur, India, December 9–12, 2022 Proceedings Lecture Notes in Computer Science 13783 FoundingEditors GerhardGoos KarlsruheInstituteofTechnology,Karlsruhe,Germany JurisHartmanis CornellUniversity,Ithaca,NY,USA EditorialBoardMembers ElisaBertino PurdueUniversity,WestLafayette,IN,USA WenGao PekingUniversity,Beijing,China BernhardSteffen TUDortmundUniversity,Dortmund,Germany MotiYung ColumbiaUniversity,NewYork,NY,USA Moreinformationaboutthisseriesathttps://link.springer.com/bookseries/558 · · Lejla Batina Stjepan Picek Mainack Mondal (Eds.) Security, Privacy, and Applied Cryptography Engineering 12th International Conference, SPACE 2022 Jaipur, India, December 9–12, 2022 Proceedings Editors LejlaBatina StjepanPicek RadboudUniversity RadboudUniversity Nijmegen,TheNetherlands Nijmegen,TheNetherlands MainackMondal IndianInstituteofTechnologyKharagpur Kharagpur,India ISSN 0302-9743 ISSN 1611-3349 (electronic) LectureNotesinComputerScience ISBN 978-3-031-22828-5 ISBN 978-3-031-22829-2 (eBook) https://doi.org/10.1007/978-3-031-22829-2 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicense toSpringerNatureSwitzerlandAG2022 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface The 12th International Conference on Security, Privacy, and Applied Cryptography Engineering2022(SPACE2022),washeldduringDecember9–12,2022.Thisannual eventisdevotedtovariousaspectsofsecurity,privacy,appliedcryptography,andcryp- tographic engineering. This is a challenging field, requiring expertise from diverse domains,rangingfrommathematicsandcomputersciencetocircuitdesign.Theevent was hosted by the Center for Cryptography, Cyber Security and Digital Forensics (C3-SDF)atTheLNMInstituteofInformationTechnology,Jaipur,India. This year we received 61 submissions from authors in many different countries, mainlyfromAsiaandEurope.Thesubmissionswereevaluatedbasedontheirsignifi- cance,novelty,technicalquality,andrelevancetotheSPACEconference.Thesubmis- sions were reviewed in a double-blind mode by at least two members of the Program Committee,whichconsistedof47membersfromallovertheworld.Afteranextensive reviewprocess,18paperswereacceptedforpresentationattheconference,leadingto anacceptancerateof29.5%. The program also included five keynotes and four tutorials on various aspects of applied cryptology, security, and privacy delivered by world-renowned researchers: Ingrid Verbauwhede, Nele Mentens, Jeyavijayan “JV” Rajendran, Chester Rebeiro, Sanjay K. Jha, Łukasz Chmielewski, Sikhar Patranabis, Nitin Singh, and Matthias Kannwischer. We sincerely thank the invited speakers for accepting our invitations in spite of their busy schedules. As in previous editions, SPACE 2022 was organized in cooperation with the International Association for Cryptologic Research (IACR). We are grateful to general chairs Jayaprakash Kar and Debdeep Mukhopadhyay for their willingnesstohostitphysicallyatLMNITJaipur. Thereisalonglistofvolunteerswhoinvestedtheirtimeandenergytoputtogether theconference.WearegratefultoallthemembersoftheProgramCommitteeandtheir sub-reviewersforalltheirhardworkintheevaluationofthesubmittedpapers.Wethank our publisher Springer for agreeing to continue to publish the SPACE proceedings as avolumeintheLectureNotesinComputerScience(LNCS)series.Wearegratefulto the local Organizing Committee who invested a lot of time and effort in order for the conferencetorunsmoothly. Last,butnotleast,oursincerethanksgotoalltheauthorswhosubmittedpapersto SPACE2022andeveryonewhoparticipated(eitherinpersonorvirtually). December2022 LejlaBatina StjepanPicek MainackMondal Organization GeneralChairs JayaprakashKar TheLNMInstituteofInformationTechnology, India DebdeepMukhopadhyay IndianInstituteofTechnology,Kharagpur,India ProgramCommitteeChairs LejlaBatina RadboudUniversity,TheNetherlands MainackMondal IndianInstituteofTechnology,Kharagpur,India StjepanPicek RadboudUniversity,TheNetherlands ProgramCommittee AmrYoussef ConcordiaUniversity,Canada AnupamChattopadhyay NanyangTechnologicalUniversity,Singapore BodhisatwaMazumdar IndianInstituteofTechnology,Indore,India BohanYang TsinghuaUniversity,China ChesterRebeiro IndianInstituteofTechnology,Madras,India ChitchanokChuengsatiansup UniversityofAdelaide,Australia ClaudeCarlet UniversityofBergen,NorwayandUniversityof Paris8,France DirmantoJap NanyangTechnologicalUniversity,Singapore DomenicForte UniversityofFlorida,USA EranToch TelAvivUniversity,Israel FanZhang ZhejiangUniversity,China GuilhermePerin RadboudUniversity,TheNetherlands IleanaBuhan RadboudUniversity,TheNetherlands JakubBreier SiliconAustriaLabs,Austria JayaprakashKar TheLNMInstituteofInformationTechnology, India Jean-LucDanger TélécomParis,France KazuoSakiyama UniversityofElectro-Communications,Japan KerstinLemke-Rust Bonn-Rhein-SiegUniversityofAppliedSciences, Germany KostasPapagiannopoulos UniversityofAmsterdam,TheNetherlands LucaMariot RadboudUniversity,TheNetherlands LukaszChmielewski RadboudUniversity,TheNetherlands viii Organization MaëlGay UniversityofStuttgart,Germany MarcStoettinger RheinMainUniversityofAppliedScience, Germany MarcManzano Sandbox@Alphabet,Spain MarineMinier UniversitédeLorraineandLoria,France MartinHenze FraunhoferFKIE,Germany MdMasoomRabbani KULeuven,Belgium NadiaElMrabet EMSE,France NallaAnandakumarNachimuthu UniversityofFlorida,USA NaofumiHomma TohokuUniversity,Japan NeleMentens LeidenUniversity,TheNetherlands OlgaGadyatskaya LeidenUniversity,TheNetherlands PeterSchwabe MPI-SP,Germany,andRadboudUniversity, TheNetherlands RahulChatterjee UniversityofWisconsin-Madison,USA RajatSubhraChakraborty IndianInstituteofTechnology,Kharagpur,India RajeshPillai DRDO,India RubenNiederhagen UniversityofSouthernDenmark,Denmark SébastienCanard OrangeLabs,France ShivamBhasin NanyangTechnologicalUniversity,Singapore SikharPatranabis IBMResearch,India SilviaMella RadboudUniversity,TheNetherlands SkSubidhAli IndianInstituteofTechnology,Bhilai,India SomitraSanadhya IndianInstituteofTechnology,Jodhpur,India SoumyajitDey IndianInstituteofTechnology,Kharagpur,India SujoySinhaRoy TUGraz,Germany UrbiChatterjee IndianInstituteofTechnology,Kanpur,India VishalSaraswat BoschEngineeringandBusinessSolutions, Bengaluru,India AdditionalReviewers MartinSerror FraunhoferFKIE,Germany WenpingZhu TsinghuaUniversity,China SoumyadyutiGhosh IndianInstituteofTechnology,Kharagpur,India RajatSadhukhan IndianInstituteofTechnology,Kharagpur,India DurbaChatterjee IndianInstituteofTechnology,Kharagpur,India Contents SymmetricCryptography ModelingLargeS-boxinMILPanda(Related-Key)DifferentialAttack onFullRoundPIPO-64/128 ............................................ 3 TarunYadavandManojKumar Light but Tight: Lightweight Composition of Serialized S-Boxes withDiffusionLayersforStrongCiphers ................................. 28 RajatSadhukhan, AnirbanChakraborty, NilanjanDatta, SikharPatranabis,andDebdeepMukhopadhyay HardwareImplementationofMaskedSKINNYSBoxwithApplication toAEAD ............................................................. 50 MustafaKhairallahandShivamBhasin BiasCancellationofMixColumns ....................................... 70 SubhadeepBanik, AndreaCaforio, KostasPapagiannopoulos, andFrancescoRegazzoni BigBrotherIsWatchingYou:ACloserLookatBackdoorConstruction ....... 81 AnubhabBaksi,ArghyaBhattacharjee,JakubBreier,TakanoriIsobe, andMridulNandi Public-Key Cryptography, Post-quantum Cryptography, Zero KnowledgeProofs KEMTLSvs.Post-quantumTLS:PerformanceonEmbeddedSystems ........ 99 RubenGonzalezandThomWiggers ProtectingtheMostSignificantBitsinScalarMultiplicationAlgorithms ...... 118 EstuardoAlpirezBock,LukaszChmielewski,andKonstantinaMiteloudi CombiningMontgomeryMultiplicationwithTagTracingforthePollard RhoAlgorithminPrimeOrderFields .................................... 138 MadhurimaMukhopadhyayandPalashSarkar Card-BasedZero-KnowledgeProoffortheNearestNeighborProperty: Zero-KnowledgeProofofABCEndView ................................ 147 TakuroFukasawaandYoshifumiManabe x Contents HardwareSecurityandAI WhatDoYouSee?TransformingFaultInjectionTargetCharacterizations ..... 165 MarinaKrcˇek Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack toRetrieveDialledCallLog ............................................ 185 AbhishekRevskar,MahendraRathor,andUrbiChatterjee MachineLearningAttacksonLow-CostReconfigurableXRROandXRBR PUFDesigns ......................................................... 204 ManthanKojage,NeelofarHassan,andUrbiChatterjee HWGN2: Side-Channel Protected NNs Through Secure and Private FunctionEvaluation ................................................... 225 MohammadHashemi,SteffiRoy,DomenicForte,andFatemehGanji How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles .............................................................. 249 TuAnhNgo, ReubenJonChia, JonathanChan, NandishChattopadhyay,andAnupamChattopadhyay NetworkSecurity,Authentication,andPrivacy SMarT: A SMT Based Privacy Preserving Smart Meter Streaming Methodology ......................................................... 267 SoumyadyutiGhosh,SoumyajitDey,andDebdeepMukhopadhyay An Analysis of the Hardware-Friendliness of AMQ Data Structures forNetworkSecurity ................................................... 287 ArishSateesan,JoVliegen,andNeleMentens RemOD:OperationalDrift-AdaptiveIntrusionDetection .................... 314 VikasMaurya,NandaRani,andSandeepKumarShukla AShortNoteonaPaperTitled:ADelaunayQuadrangle-BasedFingerprint AuthenticationSystemwithTemplateProtectionUsingTopologyCode forLocalRegistrationandSecurityEnhancement .......................... 334 SrinivasaRaoSubramanyaRao AuthorIndex ......................................................... 343

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.