SPACE 2023

13th International Conference on Security, Privacy, and Applied Cryptographic Engineering 2023

14 - 17 December 2023, IIT Roorkee

Indian Institute of Technology

Roorkee

Clg Logo
12th Conference (2022) 11th Conference (2021) 10th Conference (2020)
IIT Roorkee


Overview


International Conference on Security, Privacy and Applied Cryptographic Engineering 2023 (SPACE2023) is thirteenth in the series of conferences which started in 2011. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. SPACE 2023 will be held at IIT Roorkee, from 14th to 17th December, 2023. The program co-chairs for SPACE 2023 are Francesco Regazzoni (University of Amsterdam), Sri Parameswaran (University of New South Wales) and Bodhisatwa Mazumdar (Indian Institute of Technology Indore, Indore).


About IIT Roorkee


Indian Institute of Technology - Roorkee is among the foremost of institutes of national importance in higher technological education and in engineering, basic and applied research. Since its establishment, the Institute has played a vital role in providing the technical manpower and know-how to the country and in pursuit of research. The Institute ranks amongst the best technological institutions in the world and has contributed to all sectors of technological development. It has also been considered a trend-setter in the area of education and research in the field of science, technology, and engineering.


The Institute had celebrated its Sesquicentennial in October 1996 and now completed more than 175 years of its existence. It was converted to IIT on September 21, 2001 by an Ordinance issued by the Government of India declared it as the nation's seventh Indian Institute of Technology, an “Institution of National Importance”.


The Institute offers Bachelor's Degree courses in 10 disciplines of Engineering and Architecture and Postgraduate's Degree in 55 disciplines of Engineering, Applied Science, Architecture and planning. The Institute has facility for doctoral work in all Departments and Research Centres.


The Institute admits students to B.Tech. and B.Arch. courses through the Joint Entrance Examination (JEE) conducted at various centres all over India.


Important Dates

Submission Deadline

15 September 2023

25 September 2023 (AOE)

Notification

15 October 2023

25 October 2023 (AOE)

Final Camera Ready 1 November 2023
Conference 14-17 December 2023


Registration

Category
(Affiliation)
Early Bird Late
Regular Student Regular Student
Indian ₹14000 ₹7000 ₹15000 ₹8000
Foreigner $200 $100 $250 $150

Note:

  • Early bird - Before or on 30 November 2023
  • Late - After 30 November 2023

Form 1: Click here

Prospective attendees requiring an Indian visa should fill in this form for necessary government clearances before 10th of November.


Conference registration fee includes:

  1. Attending all the conference programs, including tutorials.
  2. Refreshments between sessions and conference lunch.
  3. Gala dinner.
  4. Short excursion.

Payment link: https://www.onlinesbi.sbi/sbicollect/icollecthome.htm?corpID=365641

Conference code: CONFR-150-CSE


For international participants, payments can be transferred to the account as per the details mentioned here

Form 2: Click here

After paying the fees, please fill in this form



Our sponsors:


National Centre of Excellence

Centre for Hardware Security Entrepreneurship Research and Development

Joint Initiative, DSCI & MeitY


All accepted papers will be published as SPACE 2023 Springer LNCS proceedings.


Springer LNCS

Call for papers

Download PDF

International Conference on Security, Privacy and Applied Cryptographic Engineering 2023 (SPACE2023) is thirteenth in the series of conferences which started in 2011. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. SPACE 2023 will be held at IIT Roorkee, from 14th to 17th December, 2023. The program co-chairs for SPACE 2023 are Francesco Regazzoni (University of Amsterdam), Sri Parameswaran (University of New South Wales) and Bodhisatwa Mazumdar (Indian Institute of Technology Indore, Indore).


All accepted papers will be published as SPACE 2023 Springer LNCS proceedings.


Topics


We invite authors to submit previously unpublished original research. Topics include but are not limited to:


Cryptographic Engineering

  • Design of Cryptographic Primitives
  • Random Number Generators and PUFs
  • Cryptographic protocols and implementations
  • Security architectures
  • Formal methods in Cryptographic Engineering
  • Attacks and countermeasures
  • Post-quantum Cryptography Implementations
  • Cryptographic Software/Hardware Design
  • IP Protection

Side-channel Analysis and Countermeasures

  • Fault Analysis and countermeasures
  • Reverse Engineering and Tampering
  • Hardware Trojan and counterfeit Detection
  • Micro-architectural Attacks
  • AI-assisted side-channel attacks
  • Cryptanalysis

Security and Privacy

  • Security of Cyber-Physical Systems
  • AI in Security and Privacy
  • Security of AI
  • Secure Networking Protocols
  • Securing Human-in-the-loop Systems
  • Data privacy and Authentication
  • Botnets and Malware
  • Anonymization Techniques and attacks
  • Network Security and Intrusion detection
  • Operating Systems Security
  • Trustworthy Computing
  • Verification and Testing for Security

Paper Submission


All SPACE 2023 submissions must be original and not simultaneously submitted to or published in another journal or conference. SPACE 2023 follows a strict double-blind policy: all submissions must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Full paper submissions must be written in English, should strictly follow the LNCS format, and should beat most 20 pages (including the bibliography but excluding clearly marked appendices). Submission to SPACE will imply the willingness of atleast one of the authors to register and present the paper in the conference. Authors should mention in abstract if a submission should be considered as short paper/work-in-progress. Authors should consult Springer's Instructions for Authors of Proceedings and use either the LaTeX or the Word templates provided on the authors' page for the preparation of their papers.


Author guidelines, as well as Latex and Word templates are available at conference proceedings guidelines


Springer encourages authors to include their ORCIDs in their papers. Springer's proceedings LaTeX templates are also available in Overleaf. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.


Submission link for SPACE 2023: https://easychair.org/conferences/?conf=space2023


Posters Submission


Thirteenth International Conference on Security, Privacy and Applied Cryptographic Engineering 2023 (SPACE 2023) is a continuation of the series of conferences, which started in 2011. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This year, we are organizing a poster session for showcasing works in progress for early-stage work in security and cryptographic engineering. The submissions will be non-archival and accepted posters will only be presented to the conference attendees.

We invite young researchers (students, researchers who have recently completed their degree, researchers working in academia, industry or elsewhere) to present their ongoing research projects, challenges dealt with in their research domain and prospective new research directions that are in-line with the theme of the conference. The submissions will go through a light peer review process.


Submission Instructions


The poster authors need to submit a title, names of authors/affiliations and an abstract (maximum 300 words) via email to SPACE 2023, on the following email addresses: Dr. Bodhisatwa Mazumdar and Dr. Sugata Gangopadhyay


Please clearly mention "POSTER SUBMISSION FOR SPACE 2023" in the subject of your email. The deadline for submission is October 30th, 2023. We will contact successful poster submissions with presentation instructions.


Topics


We invite authors to submit previously unpublished original research. Topics include but are not limited to:


Cryptographic Engineering

  • Design of Cryptographic Primitives
  • Random Number Generators and PUFs
  • Cryptographic protocols and implementations
  • Security architectures
  • Formal methods in Cryptographic Engineering
  • Attacks and countermeasures
  • Post-quantum Cryptography Implementations
  • Cryptographic Software/Hardware Design
  • IP Protection

Side-channel Analysis and Countermeasures

  • Fault Analysis and countermeasures
  • Reverse Engineering and Tampering
  • Hardware Trojan and counterfeit Detection
  • Micro-architectural Attacks
  • AI-assisted side-channel attacks
  • Cryptanalysis

Security and Privacy

  • Security of Cyber-Physical Systems
  • AI in Security and Privacy
  • Security of AI
  • Secure Networking Protocols
  • Securing Human-in-the-loop Systems
  • Data privacy and Authentication
  • Botnets and Malware
  • Anonymization Techniques and attacks
  • Network Security and Intrusion detection
  • Operating Systems Security
  • Trustworthy Computing
  • Verification and Testing for Security

Committees


The members of the different committees are:


Program Chairs

  • Francesco Regazzoni
    University of Amsterdam, (Amsterdam, The Netherlands) and Università della Svizzera Italiana (Lugano, Switzerland).

  • Sri Parameswaran
    School of Computer Science and Engineering at the University of New South Wales.

  • Bodhisatwa Mazumdar
    Computer Science and Engineering. Indian Institute of Technology Indore.

General Chairs

  • Debdeep Mukhopadhyay
    Indian Institute of Technology Kharagpur, India

  • Sugata Gangopadhyay
    Indian Institute of Technology Roorkee, India

Program Committee

  • Sugata Gangopadhyay
    Department of Computer Science and Engineering, Indian Institute of Technology Roorkee

  • Subhadeep Banik
    University of Lugano, Switzerland

  • Silvia Mella
    Radboud University

  • Marc Stöttinger
    RheinMain University of Applied Science

  • Nusa Zidaric
    Leiden University

  • Dhiman Saha
    de.ci.phe.red Labs, Indian Institute of Technology Bhilai, India

  • Ruben Niederhagen
    Academia Sinica, Taiwan, and University of Southern Denmark

  • Diego F. Aranha
    Aarhus University

  • Maël Gay
    University of Stuttgart

  • Lukasz Chmielewski
    Masaryk University

  • Francesco Regazzoni
    ALaRI - USI (Switzerland)

  • Marine Minier
    CITI INSA-Lyon - ARES INRIA Project

  • Jakub Breier
    Silicon Austria Labs

  • N. Nalla Anandakumar
    Continental Automotive, Singapore

  • Kostas Papagiannopoulos
    Radboud University

  • Claude Carlet
    University of Paris 8

  • Kerstin Lemke-Rust
    Bonn-Rhein-Sieg University of Applied Sciences

  • Kazuo Sakiyama
    The University of Electro-Communications

  • Dirmanto Jap
    Nanyang Technological University

  • Anupam Chattopadhyay
    Nanyang Technological University

  • Bohan Yang
    Tsinghua University

  • Guilherme Perin
    TU Delft

  • Debdeep Mukhopadhyay
    IIT Kharagpur, India

  • Rajat Subhra Chakraborty
    Associate Professor, Dept. of CSE, IIT Kharagpur

  • Debapriya Basu Roy
    IIT Kanpur

  • Sikhar Patranabis
    IBM Research India

  • Somitra Sanadhya
    IIT Jodhpur

  • Urbi Chatterjee
    IIT Kanpur

  • Vishal Saraswat
    Bosch Global Software Technologies

  • Md Masoom Rabbani
    KU Leuven

  • Amr Youssef
    Concordia University

  • Sujoy Sinha Roy
    IIT Kharagpur

  • Peter Schwabe
    Radboud University

  • Bodhisatwa Mazumdar
    New York University

  • Reihaneh Safavi-Naini
    University of Calgary

  • Subidh Ali
    Indian Institute of Technology Bhilai

  • Chester Rebeiro
    Indian Institute of Technology, Madras

  • Utsav Banerjee
    Indian Institute of Science

  • Jayaprakash Kar
    Department of CSE, The LNM Institute of Information Technology, Jaipur (Raj)

  • Mainack Mondal
    Indian Institute of Technology, Kharagpur

  • Ulrich Rührmair
    Ruhr University Bochum

Organising Committee

  • Prof. Kamal Kishore Pant
    Cheif Patron, Director of IIT Roorkee

  • Dr. Manoj Mishra
    Organising Chair, CSE Department, IIT Roorkee

  • Dr. R. Balasubramanian
    CSE Department, IIT Roorkee

  • Dr. Rahul Thakur
    CSE Department, IIT Roorkee

  • Dr. Durga Toshniwal
    CSE Department, IIT Roorkee

  • Dr. Sugata Gangopadhyay
    CSE Department, IIT Roorkee

  • Dr. Neetesh Kumar
    CSE Department, IIT Roorkee

  • Dr. Debiprasanna Sahoo
    CSE Department, IIT Roorkee

  • Dr. Aditi Gangopadhyay
    Mathematics Department, IIT Roorkee

  • Dr. Rajdeep Niyogi
    CSE Department, IIT Roorkee

  • Dr. Raksha Sharma
    CSE Department, IIT Roorkee

  • Dr. Sandeep Kumar Garg
    CSE Department, IIT Roorkee

  • Dr. Pradumn K. Pandey
    CSE Department, IIT Roorkee

  • Dr. Pravendra Singh
    CSE Department, IIT Roorkee

  • Dr. Shahbaz Khan
    CSE Department, IIT Roorkee

  • Dr. Partha Pritam Roy
    CSE Department, IIT Roorkee

  • Dr. Dharmendra Singh
    CSE Department, IIT Roorkee

Steering Committee

  • Debdeep Mukhopadhyay
    Indian Institute of Technology, Kharagpur

  • Chester Rebeiro
    Indian Institute of Technology, Madras

  • Veezinathan Kamakoti
    Indian Institute of Technology, Madras

  • Ulrich Ruhrmair
    Ludwig Maximilian University of Munich, Germany

Accepted papers


Following papers have been accepted for the conference -


  1. UN-SPLIT: Attacking Split Manufacturing using Link Prediction in Graph Neural Networks

    Lilas Alrahis, Likhitha Mankali, Satwik Patnaik, Abhrajit Sengupta, Johann Knechtel and Ozgur Sinanoglu

  2. Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation

    Aditya Singh Rawat and Mahabir Prasad Jhanwar

  3. Zero-knowledge proofs for SIDH variants with masked degree or torsion

    Youcef Mokrani and David Jao

  4. Token Open Secure and Post-quantum Updatable Encryption Based on MLWE

    Yang Song, Haiying Gao, Keshuo Sun and Chao Ma

  5. Results on the Key Space of Group-Ring NTRU: The case of the dihedral group

    Ali Raya, Vikas Kumar, Sugata Gangopadhyay and Aditi Gangopadhyay

  6. Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme

    Ramakant Kumar, Sahadeo Padhye and Swati Rawal

  7. Logarithmic-Size (Linkable) Ring Signatures From Lattice Isomorphism Problems

    Xuan Thanh Khuc, Anh The Ta, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima and Shinsaku Kiyomoto

  8. We must protect the Transformers: Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models

    Biplab Roy, Rohit Raj, Abir Das and Mainack Mondal

  9. On the masking-friendly designs for post-quantum cryptography

    Suparna Kundu, Angshuman Karmakar and Ingrid Verbauwhede

  10. Vulnerability of Dynamic Masking in Test Compression

    Yogendra Sao, Debanka Giri, Soham Saha and Dr. Sk. Subidh Ali

  11. High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA

    Arnaud Varillon, Laurent Sauvage and Jean-Luc Danger

  12. Cryptanalysis with countermeasure on the SIS based signature scheme

    Komal Pursharthi and Dheerendra Mishra

  13. Spliced Region Detection and Localization in Digital Images based on CNN Learning Guided by Color Transitions and Surface Texture

    Debjit Das, Ranit Das and Ruchira Naskar

  14. An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation

    Augustin P. Sarr and Ngarenon Togde

Program schedule

Day 1

December 14, 2023

9:00 to 18:30 hrs

09:00 - 09:30 hrs Welcome note
09:30 - 11:00 hrs Tutorial 1: Dr. Divya Ravi, University of Amsterdam
11:00 - 11:30 hrs Tea break
11:30 - 13:00 hrs Tutorial 1 (Continued): Dr. Divya Ravi, University of Amsterdam
13:00 - 14:30 hrs Lunch
14:30 - 16:00 hrs Tutorial 2: Dr. Subhadeep Banik, Swiss Federal Institute of Technology in Lausanne
16:00 - 16:30 hrs Tea Break
16:30 - 18:00 hrs Tutorial 2 (Continued): Dr. Subhadeep Banik, Swiss Federal Institute of Technology in Lausanne
18:00 - 18:30 hrs High Tea

Day 2

December 15, 2023

9:00 to 18:00 hrs

09:00 - 10:00 hrs Conference Opening Session
10:00 - 11:00 hrs Keynote Talk 1: Prof. Elena Dubrova, Royal Institute of Technology (KTH), Stockholm, Sweden
11:00 - 11:30 hrs Tea break
11:30 - 12:30 hrs Paper Session 1:
  1. “UN-SPLIT: Attacking Split Manufacturing using Link Prediction in Graph Neural Networks”, Lilas Alrahis, Likhitha Mankali, Satwik Patnaik, Abhrajit Sengupta, Johann Knechtel and Ozgur Sinanoglu.
  2. “High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA”, Arnaud Varillon, Laurent Sauvage and Jean Luc Danger.
12:30 - 14:00 hrs Lunch
14:00 - 15:00 hrs Keynote Talk 2: Dr. Arpita Patra, IISC Bangalore
15:00 - 16:00 hrs Paper Session 2:
  1. “Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion”, Youcef Mokrani and David Jao.
  2. “Results on the Key Space of Group-Ring NTRU: The Case of the Dihedral Group”, Ali Raya, Vikas Kumar, Sugata Gangopadhyay and Aditi Kar Gangopadhyay.
16:00 - 16:30 hrs Tea Break
16:30 - 17:30 hrs Paper Session 3:
  1. “Spliced Region Detection and Localization in Digital Images based on CNN Learning Guided by Color Transitions and Surface Texture”, Debjit Das, Ranit Das and Ruchira Naskar.
  2. “Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme”, Ramakant Kumar, Sahadeo Padhye and Swati Rawal.
17:45 hrs onwards High Tea, Banquet talk (Prof. Siddharth Garg), Cultural Program, and Banquet dinner

Day 3

December 16, 2023

9:00 to 16:30 hrs

09:00 - 10:00 hrs Keynote Talk 3: Prof. Benedikt Gierlichs, KU Leuven
10:00 - 11:00 hrs Paper Session 4:
  1. “On the Masking-Friendly Designs for Post-Quantum Cryptography”, Suparna Kundu, Angshuman Karmakar and Ingrid Verbauwhede.
  2. “Vulnerability of Dynamic Masking in Test Compression”, Yogendra Sao, Debanka Giri, Soham Saha and Dr. Sk. Subidh Ali.
11:00 - 11:30 hrs Tea Break
11:30 - 12:30 hrs Paper Session 5:
  1. “Cryptanalysis with countermeasure on the SIS based signature scheme”, Komal Pursharthi, Dheerendra Mishra.
  2. “Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation”, Aditya Singh Rawat, Mahabir Prasad Jhanwar.
12:30 - 13:30 hrs Lunch
13:30 - 14:30 hrs Keynote Talk 4: Dr. Mainack Mondal, IIT Kharagpur
14:30 - 15:30 hrs Paper Session 6:
  1. ““We must protect the Transformers”: Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models”, Rohit Raj, Biplab Roy, Abir Das and Mainack Mondal.
  2. “Logarithmic-Size (Linkable) Ring Signatures From Lattice Isomorphism Problems”, Xuan Thanh Khuc, Anh The Ta, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima and Shinsaku Kiyomoto.
15:30 - 16:30 hrs Paper Session 7:
  1. “Token Open Secure and Post-quantum Updatable Encryption Based on MLWE”, Yang Song, Haiying Gao, Keshuo Sun and Chao Ma.
  2. “An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation”, Ngarenon Togde and Augustin P. Sarr.
16:30 hrs onwards Excursion to Haridwar, Rishikesh

Day 4

December 17, 2023

9:30 to 18:30 hrs

09:30 - 10:30 hrs Post Quantum Cryptography (PQC) Workshop from KU Leuven (Prof. Benedikt Gierlichs and team) and IIT Kharagpur (Prof. Debdeep Mukhopadhyay and team)
10:30 - 11:00 hrs Tea Break
11:00 - 12:30 hrs Post Quantum Cryptography (PQC) Workshop from KU Leuven (Prof. Benedikt Gierlichs and team) and IIT Kharagpur (Prof. Debdeep Mukhopadhyay and team)
12:30 - 14:00 hrs Lunch
14:00 - 15:30 hrs Post Quantum Cryptography (PQC) Workshop from KU Leuven (Prof. Benedikt Gierlichs and team) and IIT Kharagpur (Prof. Debdeep Mukhopadhyay and team)
15:30 - 16:00 hrs High Tea and Concluding Session

Speakers


Keynote speakers

Dr. Arpita Patra

Dr. Arpita Patra

IISc Bangalore, India


Title: From theory to practice: the Marvellous journey of Mighty MPC

Abstract: Secure Multi-party Computation (MPC) is the standard-bearer and holy-grail problem in Cryptography that permits a collection of data-owners to compute a collaborative result, without any of them gaining any knowledge about the data provided by the other, except what is derivable from the result of the computation. The area was introduced in the seminal work of Yao in 1982. Since then the theory of MPC has seen some of the most fundamental results in theory of computation. Technology follows techniques and so a huge effort has gone in for turning techniques of MPC to technology. In this talk, I plan to cover the contribution we made towards solving real-world problems via applied MPC. The broad domains we tackle include social good, Health, FinTech and Smart cities.

Bio: Arpita Patra is presently an Associate Professor at Indian Institute of Science and a visiting faculty researcher at Google Research. Her area of interest is Cryptography, focusing on theoretical and practical aspects of secure multiparty computation protocols.
She received her PhD from Indian Institute of Technology (IIT), Madras and held post-doctoral positions at University of Bristol, UK, ETH Zurich, Switzerland, and Aarhus University, Denmark.
Her research has been recognized with Google Privacy Research Faculty Award 2023, J P Morgan Chase Faculty Award 2022, SONY Faculty Innovation Award 2021, Google Research Award 2020, NASI Young Scientist Platinum Jubilee Award 2018, SERB Women Excellence award 2016, INAE Young Engineer award 2016 and associateships with various scientific bodies such as Indian Academy of Sciences (IAS), National Academy of Engineering (INAE ), The World Academy of Sciences (TWAS). She is a council member of Indian Association for Research in Computing Science (IARCS).
She has coauthored a textbook on Multi-party Computation titled “Secure Multiparty Computation against Passive Adversaries”.

More about her research is available here

Dr. Benedikt Gierlichs

Dr. Benedikt Gierlichs

KU leuven, Belgium


Title: Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars

Abstract: In this talk we will summarize three real-world security analyses of PKES systems. We begin with the PKES system used in Tesla Model S (prior to our responsible disclosure). We reverse engineered the system and discovered several security weaknesses, which allow us to clone a key fob in a matter of seconds. Next we look at the same system after Tesla deployed a security fix in response to our findings. We discovered a vulnerability which allows to still clone a key fob with twice the effort compared to the initial attack. We close with the PKES system used in Tesla Model X. This system employs secure symmetric-key and public-key cryptographic primitives implemented by a Common Criteria certified Secure Element. We reverse engineered the system and discovered several issues which allow us to bypass all of the cryptographic security measures put in place. We developed an attack which enables us to gain access to the vehicle's interior in a matter of minutes and pair a modified key fob, allowing to drive off. Besides the security analyses we will also briefly report on our responsible disclosure efforts. Finally, our work highlights how hard it is to deploy seemingly simple cryptographic solutions in increasingly complex and connected vehicular systems.

Bio: Dr Benedikt Gierlichs is a research expert in the COSIC (Computer Security and Industrial Cryptography) research group at KU Leuven in Belgium. He works with the embedded security sub-group and leads the attacks and evaluations team. His research focuses on the (physical) security of embedded devices. He enjoys to apply cryptography to solve complex real-world challenges. He has co-authored more than 70 scientific publications in peer-reviewed, international conferences and journals. He has served on many program committees of international conferences and has co-chaired 4 of them. He is a member of the IACR, a Belgian delegate to the ISO/IEC SC27 standardization group and chairman of the CHES steering committee.

His research interest include Physical security of embedded cryptographic devices, Side Channel Analysis, Fault Analysis, Countermeasures, Secure system on chip design
More about his reserach is available here

Dr. Elena Dubrova

Dr. Elena Dubrova

Royal Institute of Technology (KTH) Stockholm, Sweden


Title: Side-channel analysis of post-quantum cryptographic algorithms.

Abstract: Side-channel attacks are one of the most efficient physical attacks on implementations of cryptographic algorithms at present.
They exploit the correlation between physical measurements (power consumption, electromagnetic emissions, timing) taken at different points during the algorithm's execution and the secret key.
In this talk, we will present our recent side-channel attacks on implementations post-quantum cryptographic algorithms, including profiled deep learning-based power analysis of a higher-order masked implementation of CRYSTALS-Kyber key encapsulation mechanism.
Last year CRYSTALS-Kyber has been selected for standardization by the NIST and included in the NSA suite of cryptographic algorithms recommended for national security systems.

Bio: Elena Dubrova received the Diploma Engineer degree in Computer Science from Technical University of Sofia, Bulgaria, in 1993, and Ph.D. degree in Computer Science from University of Victoria, B.C., Canada, in 1998.
Since 2008 she has been a professor at the School of Electrical Engineering and Computer Science at the Royal Institute of Technology, Stockholm, Sweden.
She has over 100 publications and 15 granted patents.
Her work has been awarded prestigious prices such as IBM faculty partnership award for outstanding contributions to IBM research and development.
She is a world's top 2% scientist according to the Stanford University ranking from 2020. Her research interests include hardware security, lightweight cryptography, logic synthesis, and multiple-valued logic.

Dr. Mainack Mondal

Dr. Mainack Mondal

IIT Kharagpur, India


Title: On designing Social Norm-Grounded Privacy preserving Systems

Abstract: Today, data privacy (collection, storage, sharing, and processing of personal data) is often highlighted in public discourse with the advent of a multitude of recent government-mandated privacy regulations like GDPR and CCPA. To that end, in this talk, I will discuss our current and ongoing body of work on creating social norm-grounded privacy-preserving systems-—systems that help to align the collection, sharing, or storage of large-scale personal user data in online systems with rules collectively created by groups of users in particular and society in general. I will give an overview of our work in this space and focus on a few specific use cases from our ongoing research in this space. I will conclude this talk by touching on our general research agenda of understanding, designing, and building human-in-the-loop, private, secure, and abuse-free systems.

Bio: Mainack Mondal is an Assistant Professor at Department of Computer Science and Engineering, IIT Kharagpur, India.
He completed his Ph.D. from the Max Planck Institute for Software Systems (MPI-SWS), Germany, in 2017.
Prior to joining IIT Kharagpur, he was a postdoctoral researcher at the University of Chicago and Cornell Tech.
Mainack is broadly interested in incorporating human factors into security and privacy and consequently designing usable online services.
Specifically, he works on developing systems that provide usable privacy and security mechanisms to online users while minimizing system abuse.
His work has led to papers in Usenix Security, ACM's CCS, NDSS, AsiaCCS, PETS, AAAI's ICWSM, Usenix's SOUPS, ACM's CSCW, ACM's CoNExt and Usenix's EuroSys among others.
His work also received a distinguished paper award in Usenix's SOUPS and Google India faculty research award in 2022.

More about his research is available here

PQC Workshop

Dr. Benedikt Gierlichs

Dr. Benedikt Gierlichs and his team

KU leuven, Belgium


Bio: Dr Benedikt Gierlichs is a research expert in the COSIC (Computer Security and Industrial Cryptography) research group at KU Leuven in Belgium. He works with the embedded security sub-group and leads the attacks and evaluations team. His research focuses on the (physical) security of embedded devices. He enjoys to apply cryptography to solve complex real-world challenges. He has co-authored more than 70 scientific publications in peer-reviewed, international conferences and journals. He has served on many program committees of international conferences and has co-chaired 4 of them. He is a member of the IACR, a Belgian delegate to the ISO/IEC SC27 standardization group and chairman of the CHES steering committee.

His research interest include Physical security of embedded cryptographic devices, Side Channel Analysis, Fault Analysis, Countermeasures, Secure system on chip design
More about his reserach is available here

Dr. Debdeep Mukhpadhyay

Dr. Debdeep Mukhpadhyay and his team

IIT Kharagpur, India


Bio: Debdeep Mukhopadhyay is currently a Visiting Professor in the School of Computer Engineering, NYU Abu Dhabi, and is an Institute Chair Professor at the Department of CSE, IIT Kharagpur.
At IIT Kharagpur he initiated Secured Embedded Architecture Laboratory (SEAL), focusing on Hardware-Security.
He holds a PhD, MS, and a B.Tech from IIT Kharagpur.
His research interests are on the topics of Cryptographic Engineering, Micro-architectural security and Hardware-Security.
Recently he is intrigued by adversarial attacks on machine-learning, and encrypted computations, which includes homomorphic computations and searchable encryptions.

Mukhopadhyay has published more than 250 papers in peer-reviewed conferences and journals, and is in the editorial boards and program committees of several top journals and conferences.
Mukhopadhyay is the recipient of the prestigious Shanti Swarup Bhatnagar Award 2021 for Science and Technology (highest science honor in India below the age of 45) and is a Fellow of the Indian National Academy of Engineers, and Fellow of the Asia-Pacific Artificial Intelligence Association (AAIA) for contributions to Information Security.

He is also a fellow of C3iHub (Cyber Security and Cyber Security for Cyber-Physical Systems) Innovation Hub of IIT Kanpur, and has been enlisted in Asia's most outstanding researchers compiled by Asian Scientist Magazine.
He was awarded the Qualcomm Faculty Award 2022, Khosla National Award from IIT Roorkee 2021, DST Swarnajayanti Fellowship 2015-16, INSA Young Scientist award, INAE Young Engineer award, and Associateship for the Indian Academy of Sciences and is a senior member of IEEE/ACM.

Tutorials

Dr. Divya Ravi

Dr. Divya Ravi

University of Amsterdam, Netherlands


Title: Foundations of Secure Multi-party Computation

Abstract: Traditionally, cryptography is used to protect data in transit from an eavesdropping adversary. With the advent of big data and large-scale computation, cryptography can offer us much more. A cryptographic tool called Secure Multi- party Computation (MPC) allows a set of mutually distrusting entities to compute a combined function on their private inputs, with the guarantee that nothing beyond the output of the computation is revealed. The current and potential impact of MPC is widespread in real-life applications where data sharing is constrained due to legal, ethical or privacy reasons.

In this tutorial, we will learn the foundations of MPC protocols. In particular, we focus on two types of standard approaches used in the design of MPC protocols: secret-sharing based and garbled-circuit based protocols.

Bio: Divya Ravi is currently an Assistant Professor in the Complex Cyber Infrastructure (CCI) Group at University of Amsterdam, Netherlands.

Previously, she was a post-doctoral researcher in the Cryptography and Security Group at Aarhus University, Denmark. she received her PhD at Indian Institute of Science (IISc), Bangalore, India where she was supervised by Dr. Arpita Patra . She completed M.E (Masters) in Computer Science from CSA, IISc and B.E (Bachelors) in Computer Science from BITS Pilani, Hyderabad Campus, India.

Her research interests primarily include Secure Multi-party Computation and Distributed Computing.

More specifically, she is interested in finding solutions to intriguing questions such as the feasibility of tasks related to secure multiparty computation (MPC) and construction of efficient distributed computing protocols under different settings of network and computational models

More about her reserach is available here

Dr. Subhadeep Banik

Dr. Subhadeep Banik

University of Lugano, Switzerland


Title: HARDWARE SOLVERS OVER GF(2)

Abstract: It is well known that linear equations over any finite field can be solved using Gaussian Elimination (GE) efficiently. GE is even more efficient to implement in hardware, and there have been numerous architectures proposed for it.

Regarding higher degree equations, the hardware architecture proposed in BCC+13 uses gray code based search to solve only quadratic equations. The idea is to efficiently traverse the space of potential solutions via a graycode path, which takes much less computational load than traversing it lexicographically. But this architecture is limited to degree 2 equations and so for a while solving higher degree equation system efficiently in hardware was an open problem.

Möbius transform is a linear circuit used to compute the evaluations of a Boolean function over all points on its input domain. The operation is very useful in finding the solution of a system of polynomial equations over GF (2) for obvious reasons. However the operation, although linear, needs exponential number of logic operations (around $n \cdot 2^{n−1}$ bit xors) for an n-variable Boolean function. As such the only known hardware circuit to efficiently compute the Möbius Transform requires silicon area that is exponential in n. For Boolean functions whose algebraic degree is bound by some parameter d, recursive definitions of the Möbius Transform exist that requires only O(n^{d+1} ) space in software. However converting the mathematical definition of this space-efficient algorithm into a hardware architecture is a non-trivial task, primarily because the recursion calls notionally lead to a depth-first search in a transition graph that requires context switches at each recursion call for which straightforward mapping in hardware is difficult. In this paper we look to overcome these very challenges in an engineering sense. We propose a space efficient sequential hardware circuit for the Möbius Transform that requires only polynomial circuit area (i.e. O(n^{d+1} )) provided the algebraic degree of the Boolean function is limited to d. We show how this circuit can be used as a component to efficiently solve polynomial equations of degree at most d by using fast exhaustive search. We propose three different circuit architectures for this, each of which uses the Möbius Transform circuit as a core component. We show that asymptotically, all the solutions of a system of m polynomials in n unknowns and algebraic degree d over GF (2) can be found using a circuit of silicon area proportional to $m \cdot n^{d+1}$ and circuit depth proportional to $2 \cdot \log_2 (n - d)$.
We then introduce the architecture Polysolve4, a hardware solver that additionally aims to achieve energy efficiency. The main idea is we reduce the solution space to a small enough value by parallel application of Möbius Transform circuits over the first few equations of the system. This is done so that one can check individually whether the vectors of this reduced solution space satisfy each of the remaining equations of the system using lower power consumption. The new circuit has area also bound by $m \cdot n^{d+1}$ and has circuit depth proportional to $d \cdot log_2 n$. We also show that further optimizations wrt energy may be obtained by using depth-bound Möbius circuits that exponentially decrease run time at the cost of additional logic area and depth.

Bio: Subhadeep Banik completed his B.Tech in Electronics and Electrical Communication Engineering and M.Tech in Automation and Computer Vision from the Indian Institute of Technology at Kharagpur in 2006. He received his PhD in Computer Science from the Indian Statistical Institute, Kolkata in 2015.

He was a Post Doctoral Researcher in DTU Compute at Lyngby and at Temasek Labs, NTU Singapore. He worked as an Ambizione fellow in the LASEC group in Ecole Polytechnique Federale de Lausanne since June 2017.He is currently at USi in Lugano.

More about his research is available here

Venue


The conference will be held at Indian Institute of Technology, Roorkee campus


Department Postal Address:
Department of Computer Science and Engineering,
Indian Institute of Technology Roorkee,
Roorkee-247667, Uttarakhand, India

How to reach ?


Roorkee is well connected to Delhi by rail and road. It is situated on National Highways 58 and 73 and is on Amritsar-Howrah main rail route. Some trains which are convenient for travelling between Delhi and Roorkee are New Delhi-Dehradun-New Delhi Shatabdi Express and Dehradun-New Delhi-Dehradun Janshatabdi Express. The nearest airport is located at Jollygrant, Dehradun. However, New Delhi is the preferred airport. National Highway 58 from New Delhi to the higher reaches of the Himalayas passes via Roorkee. Roorkee is, therefore, well connected to all the major cities in the region by road. There are frequent bus services to this place from the Maharana Pratap Inter State Bus Terminal (Kashmere Gate) Delhi.

  • Roadways
    Traveling from Delhi, Roorkee is located towards north approximately 170 kilometers. Take the highway NH58, and it passes through Roorkee. The city of Haridwar is located further on the same highway about 29 kilometers from Roorkee.
    The main bus depot of Roorkee is located on NH58. Several buses run from various cities in North India.


  • Railways
    Easiest way to get to Roorkee is by train. There are several trains serving Roorkee daily from various cities around. The high speed trains Shatabdi and Jan Shatabti also stop at Roorkee on their route Delhi - Dehradun. By train, it takes less than 3 hours and 30 minutes to reach Roorkee from Delhi, so it is the fastest and most economical way of travel.
    Incidentally, the first locomotive of India ran on rails in Roorkee in 1846, well before the first passenger rail that ran in Thane.


  • Airways
    Nearest airport to Roorkee is Dehradun's Jolly Grant airport. But most preferable airport nearest from Roorkee is the New Delhi International Airport which is about 180 kilometers away.


Accomodation


  • IITR Guest House upon payment (subject to availability)
  • Nearby hotels


    The conference will arrange transport between nearby hotels and the conference venue.


    Recommended hotels:


    Ambrosia Sarovar Portico

    Ambrosia Sarovar Portico, Haridwar

    A Premium Hotel in Haridwar


    NH 334, 12th Milestone, Badehri, Rajputna, PO: Patanjali Yogpeeth, Haridwar, Uttarakhand 249405

    +91 9536900146

    Go to maps

    Special rate for SPACE attendees


    Promo Code - IITR

    Check-in - 13 December

    Check-out - 17 December


    • Login to the site Sarovar Hotels
    • Select Hotel Ambrosia Sarovar Portico, Haridwar
    • Use promo code IITR & get your special rates for IIT Roorkee

    Ambrosia Sarovar Portico

    Hotel Center Point, Roorkee

    Set in a commercial area, this unpretentious hotel is 3 km from Roorkee railway station and 52 km from Rajaji National Park.


    22/224, Civil Lines, Roorkee, Uttarakhand 247667

    +91 7895043739

    Go to maps

Contact


Sugata Gangopadhyay

Sugata Gangopadhyay

Email: sugata.gangopadhyay@cs.iitr.ac.in

Mobile: +91 74560 62255

Quick links


EasyChair for SPACE 2023 Conference proceedings guidelines Accepted papers


Downloads


Call for papers - PDF Conference Agenda Poster - PDF

Previous conferences


12th Conference 11th Conference 10th Conference

Social links




© 2023 IIT Roorkee. All Rights Reserved