
Overview
International Conference on Security, Privacy and Applied Cryptographic Engineering 2023 (SPACE2023) is thirteenth in the series of conferences which started in 2011. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. SPACE 2023 will be held at IIT Roorkee, from 14th to 17th December, 2023. The program co-chairs for SPACE 2023 are Francesco Regazzoni (University of Amsterdam), Sri Parameswaran (University of New South Wales) and Bodhisatwa Mazumdar (Indian Institute of Technology Indore, Indore).
About IIT Roorkee
Indian Institute of Technology - Roorkee is among the foremost of institutes of national importance in higher technological education and in engineering, basic and applied research. Since its establishment, the Institute has played a vital role in providing the technical manpower and know-how to the country and in pursuit of research. The Institute ranks amongst the best technological institutions in the world and has contributed to all sectors of technological development. It has also been considered a trend-setter in the area of education and research in the field of science, technology, and engineering.
The Institute had celebrated its Sesquicentennial in October 1996 and now completed more than 175 years of its existence. It was converted to IIT on September 21, 2001 by an Ordinance issued by the Government of India declared it as the nation's seventh Indian Institute of Technology, an “Institution of National Importance”.
The Institute offers Bachelor's Degree courses in 10 disciplines of Engineering and Architecture and Postgraduate's Degree in 55 disciplines of Engineering, Applied Science, Architecture and planning. The Institute has facility for doctoral work in all Departments and Research Centres.
The Institute admits students to B.Tech. and B.Arch. courses through the Joint Entrance Examination (JEE) conducted at various centres all over India.
Important Dates
Submission Deadline |
15 September 2023 25 September 2023 (AOE) |
Notification |
15 October 2023 25 October 2023 (AOE) |
Final Camera Ready | 1 November 2023 |
Conference | 14-17 December 2023 |
Registration
Category (Affiliation) |
Early Bird | Late | ||
Regular | Student | Regular | Student | |
Indian | ₹14000 | ₹7000 | ₹15000 | ₹8000 |
Foreigner | $200 | $100 | $250 | $150 |
Note:
- Early bird - Before or on 30 November 2023
- Late - After 30 November 2023
Form 1: Click here
Prospective attendees requiring an Indian visa should fill in this form for necessary government clearances before 10th of November.
Conference registration fee includes:
- Attending all the conference programs, including tutorials.
- Refreshments between sessions and conference lunch.
- Gala dinner.
- Short excursion.
Payment link: https://www.onlinesbi.sbi/sbicollect/icollecthome.htm?corpID=365641
Conference code: CONFR-150-CSE
Form 2: Click here
After paying the fees, please fill in this form
Our sponsors:


Joint Initiative, DSCI & MeitY
All accepted papers will be published as SPACE 2023 Springer LNCS proceedings.

Call for papers
Download PDFInternational Conference on Security, Privacy and Applied Cryptographic Engineering 2023 (SPACE2023) is thirteenth in the series of conferences which started in 2011. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. SPACE 2023 will be held at IIT Roorkee, from 14th to 17th December, 2023. The program co-chairs for SPACE 2023 are Francesco Regazzoni (University of Amsterdam), Sri Parameswaran (University of New South Wales) and Bodhisatwa Mazumdar (Indian Institute of Technology Indore, Indore).
All accepted papers will be published as SPACE 2023 Springer LNCS proceedings.
Topics
We invite authors to submit previously unpublished original research. Topics include but are not limited to:
Cryptographic Engineering
- Design of Cryptographic Primitives
- Random Number Generators and PUFs
- Cryptographic protocols and implementations
- Security architectures
- Formal methods in Cryptographic Engineering
- Attacks and countermeasures
- Post-quantum Cryptography Implementations
- Cryptographic Software/Hardware Design
- IP Protection
Side-channel Analysis and Countermeasures
- Fault Analysis and countermeasures
- Reverse Engineering and Tampering
- Hardware Trojan and counterfeit Detection
- Micro-architectural Attacks
- AI-assisted side-channel attacks
- Cryptanalysis
Security and Privacy
- Security of Cyber-Physical Systems
- AI in Security and Privacy
- Security of AI
- Secure Networking Protocols
- Securing Human-in-the-loop Systems
- Data privacy and Authentication
- Botnets and Malware
- Anonymization Techniques and attacks
- Network Security and Intrusion detection
- Operating Systems Security
- Trustworthy Computing
- Verification and Testing for Security
Paper Submission
All SPACE 2023 submissions must be original and not simultaneously submitted to or published in another journal or conference. SPACE 2023 follows a strict double-blind policy: all submissions must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Full paper submissions must be written in English, should strictly follow the LNCS format, and should beat most 20 pages (including the bibliography but excluding clearly marked appendices). Submission to SPACE will imply the willingness of atleast one of the authors to register and present the paper in the conference. Authors should mention in abstract if a submission should be considered as short paper/work-in-progress. Authors should consult Springer's Instructions for Authors of Proceedings and use either the LaTeX or the Word templates provided on the authors' page for the preparation of their papers.
Author guidelines, as well as Latex and Word templates are available at conference proceedings guidelines
Springer encourages authors to include their ORCIDs in their papers. Springer's proceedings LaTeX templates are also available in Overleaf. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.
Submission link for SPACE 2023: https://easychair.org/conferences/?conf=space2023
Posters Submission
Thirteenth International Conference on Security, Privacy and Applied Cryptographic Engineering 2023 (SPACE 2023) is a continuation of the series of conferences, which started in 2011. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This year, we are organizing a poster session for showcasing works in progress for early-stage work in security and cryptographic engineering. The submissions will be non-archival and accepted posters will only be presented to the conference attendees.
We invite young researchers (students, researchers who have recently completed their degree, researchers working in academia, industry or elsewhere) to present their ongoing research projects, challenges dealt with in their research domain and prospective new research directions that are in-line with the theme of the conference. The submissions will go through a light peer review process.
Submission Instructions
The poster authors need to submit a title, names of authors/affiliations and an abstract (maximum 300 words) via email to SPACE 2023, on the following email addresses: Dr. Bodhisatwa Mazumdar and Dr. Sugata Gangopadhyay
Please clearly mention "POSTER SUBMISSION FOR SPACE 2023" in the subject of your email. The deadline for submission is October 30th, 2023. We will contact successful poster submissions with presentation instructions.
Topics
We invite authors to submit previously unpublished original research. Topics include but are not limited to:
Cryptographic Engineering
- Design of Cryptographic Primitives
- Random Number Generators and PUFs
- Cryptographic protocols and implementations
- Security architectures
- Formal methods in Cryptographic Engineering
- Attacks and countermeasures
- Post-quantum Cryptography Implementations
- Cryptographic Software/Hardware Design
- IP Protection
Side-channel Analysis and Countermeasures
- Fault Analysis and countermeasures
- Reverse Engineering and Tampering
- Hardware Trojan and counterfeit Detection
- Micro-architectural Attacks
- AI-assisted side-channel attacks
- Cryptanalysis
Security and Privacy
- Security of Cyber-Physical Systems
- AI in Security and Privacy
- Security of AI
- Secure Networking Protocols
- Securing Human-in-the-loop Systems
- Data privacy and Authentication
- Botnets and Malware
- Anonymization Techniques and attacks
- Network Security and Intrusion detection
- Operating Systems Security
- Trustworthy Computing
- Verification and Testing for Security
Committees
The members of the different committees are:
Program Chairs
-
Francesco Regazzoni
University of Amsterdam, (Amsterdam, The Netherlands) and Università della Svizzera Italiana (Lugano, Switzerland). -
Sri Parameswaran
School of Computer Science and Engineering at the University of New South Wales. -
Bodhisatwa Mazumdar
Computer Science and Engineering. Indian Institute of Technology Indore.
General Chairs
-
Debdeep Mukhopadhyay
Indian Institute of Technology Kharagpur, India -
Sugata Gangopadhyay
Indian Institute of Technology Roorkee, India
Program Committee
-
Sugata Gangopadhyay
Department of Computer Science and Engineering, Indian Institute of Technology Roorkee -
Subhadeep Banik
University of Lugano, Switzerland -
Silvia Mella
Radboud University -
Marc Stöttinger
RheinMain University of Applied Science -
Nusa Zidaric
Leiden University -
Dhiman Saha
de.ci.phe.red Labs, Indian Institute of Technology Bhilai, India -
Ruben Niederhagen
Academia Sinica, Taiwan, and University of Southern Denmark -
Diego F. Aranha
Aarhus University -
Maël Gay
University of Stuttgart -
Lukasz Chmielewski
Masaryk University -
Francesco Regazzoni
ALaRI - USI (Switzerland) -
Marine Minier
CITI INSA-Lyon - ARES INRIA Project -
Jakub Breier
Silicon Austria Labs -
N. Nalla Anandakumar
Continental Automotive, Singapore -
Kostas Papagiannopoulos
Radboud University -
Claude Carlet
University of Paris 8 -
Kerstin Lemke-Rust
Bonn-Rhein-Sieg University of Applied Sciences -
Kazuo Sakiyama
The University of Electro-Communications -
Dirmanto Jap
Nanyang Technological University -
Anupam Chattopadhyay
Nanyang Technological University -
Bohan Yang
Tsinghua University -
Guilherme Perin
TU Delft -
Debdeep Mukhopadhyay
IIT Kharagpur, India -
Rajat Subhra Chakraborty
Associate Professor, Dept. of CSE, IIT Kharagpur -
Debapriya Basu Roy
IIT Kanpur -
Sikhar Patranabis
IBM Research India -
Somitra Sanadhya
IIT Jodhpur -
Urbi Chatterjee
IIT Kanpur -
Vishal Saraswat
Bosch Global Software Technologies -
Md Masoom Rabbani
KU Leuven -
Amr Youssef
Concordia University -
Sujoy Sinha Roy
IIT Kharagpur -
Peter Schwabe
Radboud University -
Bodhisatwa Mazumdar
New York University -
Reihaneh Safavi-Naini
University of Calgary -
Subidh Ali
Indian Institute of Technology Bhilai -
Chester Rebeiro
Indian Institute of Technology, Madras -
Utsav Banerjee
Indian Institute of Science -
Jayaprakash Kar
Department of CSE, The LNM Institute of Information Technology, Jaipur (Raj) -
Mainack Mondal
Indian Institute of Technology, Kharagpur -
Ulrich Rührmair
Ruhr University Bochum
Organising Committee
-
Prof. Kamal Kishore Pant
Cheif Patron, Director of IIT Roorkee -
Dr. Manoj Mishra
Organising Chair, CSE Department, IIT Roorkee -
Dr. R. Balasubramanian
CSE Department, IIT Roorkee -
Dr. Rahul Thakur
CSE Department, IIT Roorkee -
Dr. Durga Toshniwal
CSE Department, IIT Roorkee -
Dr. Sugata Gangopadhyay
CSE Department, IIT Roorkee -
Dr. Neetesh Kumar
CSE Department, IIT Roorkee -
Dr. Debiprasanna Sahoo
CSE Department, IIT Roorkee -
Dr. Aditi Gangopadhyay
Mathematics Department, IIT Roorkee -
Dr. Rajdeep Niyogi
CSE Department, IIT Roorkee -
Dr. Raksha Sharma
CSE Department, IIT Roorkee -
Dr. Sandeep Kumar Garg
CSE Department, IIT Roorkee -
Dr. Pradumn K. Pandey
CSE Department, IIT Roorkee -
Dr. Pravendra Singh
CSE Department, IIT Roorkee -
Dr. Shahbaz Khan
CSE Department, IIT Roorkee -
Dr. Partha Pritam Roy
CSE Department, IIT Roorkee -
Dr. Dharmendra Singh
CSE Department, IIT Roorkee
Steering Committee
-
Debdeep Mukhopadhyay
Indian Institute of Technology, Kharagpur -
Chester Rebeiro
Indian Institute of Technology, Madras -
Veezinathan Kamakoti
Indian Institute of Technology, Madras -
Ulrich Ruhrmair
Ludwig Maximilian University of Munich, Germany
Accepted papers
Following papers have been accepted for the conference -
-
UN-SPLIT: Attacking Split Manufacturing using Link Prediction in Graph Neural Networks
Lilas Alrahis, Likhitha Mankali, Satwik Patnaik, Abhrajit Sengupta, Johann Knechtel and Ozgur Sinanoglu
-
Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation
Aditya Singh Rawat and Mahabir Prasad Jhanwar
-
Zero-knowledge proofs for SIDH variants with masked degree or torsion
Youcef Mokrani and David Jao
-
Token Open Secure and Post-quantum Updatable Encryption Based on MLWE
Yang Song, Haiying Gao, Keshuo Sun and Chao Ma
-
Results on the Key Space of Group-Ring NTRU: The case of the dihedral group
Ali Raya, Vikas Kumar, Sugata Gangopadhyay and Aditi Gangopadhyay
-
Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme
Ramakant Kumar, Sahadeo Padhye and Swati Rawal
-
Logarithmic-Size (Linkable) Ring Signatures From Lattice Isomorphism Problems
Xuan Thanh Khuc, Anh The Ta, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima and Shinsaku Kiyomoto
-
We must protect the Transformers: Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models
Biplab Roy, Rohit Raj, Abir Das and Mainack Mondal
-
On the masking-friendly designs for post-quantum cryptography
Suparna Kundu, Angshuman Karmakar and Ingrid Verbauwhede
-
Vulnerability of Dynamic Masking in Test Compression
Yogendra Sao, Debanka Giri, Soham Saha and Dr. Sk. Subidh Ali
-
High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA
Arnaud Varillon, Laurent Sauvage and Jean-Luc Danger
-
Cryptanalysis with countermeasure on the SIS based signature scheme
Komal Pursharthi and Dheerendra Mishra
-
Spliced Region Detection and Localization in Digital Images based on CNN Learning Guided by Color Transitions and Surface Texture
Debjit Das, Ranit Das and Ruchira Naskar
-
An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation
Augustin P. Sarr and Ngarenon Togde
Program schedule
Day 1
December 14, 2023
9:00 to 18:30 hrs
09:00 - 09:30 hrs | Welcome note |
09:30 - 11:00 hrs | Tutorial 1: Dr. Divya Ravi, University of Amsterdam |
11:00 - 11:30 hrs | Tea break |
11:30 - 13:00 hrs | Tutorial 1 (Continued): Dr. Divya Ravi, University of Amsterdam |
13:00 - 14:30 hrs | Lunch |
14:30 - 16:00 hrs | Tutorial 2: Dr. Subhadeep Banik, Swiss Federal Institute of Technology in Lausanne |
16:00 - 16:30 hrs | Tea Break |
16:30 - 18:00 hrs | Tutorial 2 (Continued): Dr. Subhadeep Banik, Swiss Federal Institute of Technology in Lausanne |
18:00 - 18:30 hrs | High Tea |
Day 2
December 15, 2023
9:00 to 18:00 hrs
09:00 - 10:00 hrs | Conference Opening Session |
10:00 - 11:00 hrs | Keynote Talk 1: Prof. Elena Dubrova, Royal Institute of Technology (KTH), Stockholm, Sweden |
11:00 - 11:30 hrs | Tea break |
11:30 - 12:30 hrs |
Paper Session 1:
|
12:30 - 14:00 hrs | Lunch |
14:00 - 15:00 hrs | Keynote Talk 2: Dr. Arpita Patra, IISC Bangalore |
15:00 - 16:00 hrs |
Paper Session 2:
|
16:00 - 16:30 hrs | Tea Break |
16:30 - 17:30 hrs |
Paper Session 3:
|
17:45 hrs onwards | High Tea, Banquet talk (Prof. Siddharth Garg), Cultural Program, and Banquet dinner |
Day 3
December 16, 2023
9:00 to 16:30 hrs
09:00 - 10:00 hrs | Keynote Talk 3: Prof. Benedikt Gierlichs, KU Leuven |
10:00 - 11:00 hrs |
Paper Session 4:
|
11:00 - 11:30 hrs | Tea Break |
11:30 - 12:30 hrs |
Paper Session 5:
|
12:30 - 13:30 hrs | Lunch |
13:30 - 14:30 hrs | Keynote Talk 4: Dr. Mainack Mondal, IIT Kharagpur |
14:30 - 15:30 hrs |
Paper Session 6:
|
15:30 - 16:30 hrs |
Paper Session 7:
|
16:30 hrs onwards | Excursion to Haridwar, Rishikesh |
Day 4
December 17, 2023
9:30 to 18:30 hrs
09:30 - 10:30 hrs | Post Quantum Cryptography (PQC) Workshop from KU Leuven (Prof. Benedikt Gierlichs and team) and IIT Kharagpur (Prof. Debdeep Mukhopadhyay and team) |
10:30 - 11:00 hrs | Tea Break |
11:00 - 12:30 hrs | Post Quantum Cryptography (PQC) Workshop from KU Leuven (Prof. Benedikt Gierlichs and team) and IIT Kharagpur (Prof. Debdeep Mukhopadhyay and team) |
12:30 - 14:00 hrs | Lunch |
14:00 - 15:30 hrs | Post Quantum Cryptography (PQC) Workshop from KU Leuven (Prof. Benedikt Gierlichs and team) and IIT Kharagpur (Prof. Debdeep Mukhopadhyay and team) |
15:30 - 16:00 hrs | High Tea and Concluding Session |
Speakers
Keynote speakers

Dr. Arpita Patra
IISc Bangalore, India
Title: From theory to practice: the Marvellous journey of Mighty MPC
Abstract: Secure Multi-party Computation (MPC) is the standard-bearer and holy-grail problem in Cryptography that permits a collection of data-owners to compute a collaborative result, without any of them gaining any knowledge about the data provided by the other, except what is derivable from the result of the computation. The area was introduced in the seminal work of Yao in 1982. Since then the theory of MPC has seen some of the most fundamental results in theory of computation. Technology follows techniques and so a huge effort has gone in for turning techniques of MPC to technology. In this talk, I plan to cover the contribution we made towards solving real-world problems via applied MPC. The broad domains we tackle include social good, Health, FinTech and Smart cities.
Bio: Arpita Patra is presently an Associate
Professor at Indian Institute of Science and a visiting faculty
researcher at Google Research. Her area of interest is
Cryptography, focusing on theoretical and practical aspects of
secure multiparty computation protocols.
She received her PhD from Indian Institute of Technology (IIT),
Madras and held post-doctoral positions at University of
Bristol, UK, ETH Zurich, Switzerland, and Aarhus University,
Denmark.
Her research has been recognized with Google Privacy Research
Faculty Award 2023, J P Morgan Chase Faculty Award 2022, SONY
Faculty Innovation Award 2021, Google Research Award 2020, NASI
Young Scientist Platinum Jubilee Award 2018, SERB Women
Excellence award 2016, INAE Young Engineer award 2016 and
associateships with various scientific bodies such as Indian
Academy of Sciences (IAS), National Academy of Engineering (INAE
), The World Academy of Sciences (TWAS). She is a council member
of Indian Association for Research in Computing Science (IARCS).
She has coauthored a textbook on Multi-party Computation titled
“Secure Multiparty Computation against Passive Adversaries”.
More about her research is available here

Dr. Benedikt Gierlichs
KU leuven, Belgium
Title: Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars
Abstract: In this talk we will summarize three real-world security analyses of PKES systems. We begin with the PKES system used in Tesla Model S (prior to our responsible disclosure). We reverse engineered the system and discovered several security weaknesses, which allow us to clone a key fob in a matter of seconds. Next we look at the same system after Tesla deployed a security fix in response to our findings. We discovered a vulnerability which allows to still clone a key fob with twice the effort compared to the initial attack. We close with the PKES system used in Tesla Model X. This system employs secure symmetric-key and public-key cryptographic primitives implemented by a Common Criteria certified Secure Element. We reverse engineered the system and discovered several issues which allow us to bypass all of the cryptographic security measures put in place. We developed an attack which enables us to gain access to the vehicle's interior in a matter of minutes and pair a modified key fob, allowing to drive off. Besides the security analyses we will also briefly report on our responsible disclosure efforts. Finally, our work highlights how hard it is to deploy seemingly simple cryptographic solutions in increasingly complex and connected vehicular systems.
Bio: Dr Benedikt Gierlichs is a research expert in the COSIC (Computer Security and Industrial Cryptography) research group at KU Leuven in Belgium. He works with the embedded security sub-group and leads the attacks and evaluations team. His research focuses on the (physical) security of embedded devices. He enjoys to apply cryptography to solve complex real-world challenges. He has co-authored more than 70 scientific publications in peer-reviewed, international conferences and journals. He has served on many program committees of international conferences and has co-chaired 4 of them. He is a member of the IACR, a Belgian delegate to the ISO/IEC SC27 standardization group and chairman of the CHES steering committee.
His research interest include Physical security of embedded
cryptographic devices, Side Channel Analysis, Fault Analysis,
Countermeasures, Secure system on chip design
More about his reserach is
available here

Dr. Elena Dubrova
Royal Institute of Technology (KTH) Stockholm, Sweden
Title: Side-channel analysis of post-quantum cryptographic algorithms.
Abstract: Side-channel attacks are one of the
most efficient physical attacks on implementations of
cryptographic algorithms at present.
They exploit the correlation between physical measurements
(power consumption, electromagnetic emissions, timing) taken at
different points during the algorithm's execution and the secret
key.
In this talk, we will present our recent side-channel attacks on
implementations post-quantum cryptographic algorithms, including
profiled deep learning-based power analysis of a higher-order
masked implementation of CRYSTALS-Kyber key encapsulation
mechanism.
Last year CRYSTALS-Kyber has been selected for standardization
by the NIST and included in the NSA suite of cryptographic
algorithms recommended for national security systems.
Bio: Elena Dubrova received the Diploma
Engineer degree in Computer Science from Technical University of
Sofia, Bulgaria, in 1993, and Ph.D. degree in Computer Science
from University of Victoria, B.C., Canada, in 1998.
Since 2008 she has been a professor at the School of Electrical
Engineering and Computer Science at the Royal Institute of
Technology, Stockholm, Sweden.
She has over 100 publications and 15 granted patents.
Her work has been awarded prestigious prices such as IBM faculty
partnership award for outstanding contributions to IBM research
and development.
She is a world's top 2% scientist according to the Stanford
University ranking from 2020. Her research interests include
hardware security, lightweight cryptography, logic synthesis,
and multiple-valued logic.

Dr. Mainack Mondal
IIT Kharagpur, India
Title: On designing Social Norm-Grounded Privacy preserving Systems
Abstract: Today, data privacy (collection, storage, sharing, and processing of personal data) is often highlighted in public discourse with the advent of a multitude of recent government-mandated privacy regulations like GDPR and CCPA. To that end, in this talk, I will discuss our current and ongoing body of work on creating social norm-grounded privacy-preserving systems-—systems that help to align the collection, sharing, or storage of large-scale personal user data in online systems with rules collectively created by groups of users in particular and society in general. I will give an overview of our work in this space and focus on a few specific use cases from our ongoing research in this space. I will conclude this talk by touching on our general research agenda of understanding, designing, and building human-in-the-loop, private, secure, and abuse-free systems.
Bio: Mainack Mondal is an Assistant Professor
at Department of Computer Science and Engineering, IIT
Kharagpur, India.
He completed his Ph.D. from the Max Planck Institute for
Software Systems (MPI-SWS), Germany, in 2017.
Prior to joining IIT Kharagpur, he was a postdoctoral researcher
at the University of Chicago and Cornell Tech.
Mainack is broadly interested in incorporating human factors
into security and privacy and consequently designing usable
online services.
Specifically, he works on developing systems that provide usable
privacy and security mechanisms to online users while minimizing
system abuse.
His work has led to papers in Usenix Security, ACM's CCS, NDSS,
AsiaCCS, PETS, AAAI's ICWSM, Usenix's SOUPS, ACM's CSCW, ACM's
CoNExt and Usenix's EuroSys among others.
His work also received a distinguished paper award in Usenix's
SOUPS and Google India faculty research award in 2022.
More about his research is available here
PQC Workshop

Dr. Benedikt Gierlichs and his team
KU leuven, Belgium
Bio: Dr Benedikt Gierlichs is a research expert in the COSIC (Computer Security and Industrial Cryptography) research group at KU Leuven in Belgium. He works with the embedded security sub-group and leads the attacks and evaluations team. His research focuses on the (physical) security of embedded devices. He enjoys to apply cryptography to solve complex real-world challenges. He has co-authored more than 70 scientific publications in peer-reviewed, international conferences and journals. He has served on many program committees of international conferences and has co-chaired 4 of them. He is a member of the IACR, a Belgian delegate to the ISO/IEC SC27 standardization group and chairman of the CHES steering committee.
His research interest include Physical security of embedded
cryptographic devices, Side Channel Analysis, Fault Analysis,
Countermeasures, Secure system on chip design
More about his reserach is
available here

Dr. Debdeep Mukhpadhyay and his team
IIT Kharagpur, India
Bio: Debdeep Mukhopadhyay is currently a
Visiting Professor in the School of Computer Engineering, NYU
Abu Dhabi, and is an Institute Chair Professor at the Department
of CSE, IIT Kharagpur.
At IIT Kharagpur he initiated Secured Embedded Architecture
Laboratory (SEAL), focusing on Hardware-Security.
He holds a PhD, MS, and a B.Tech from IIT Kharagpur.
His research interests are on the topics of Cryptographic
Engineering, Micro-architectural security and Hardware-Security.
Recently he is intrigued by adversarial attacks on
machine-learning, and encrypted computations, which includes
homomorphic computations and searchable encryptions.
Mukhopadhyay has published more than 250 papers in peer-reviewed
conferences and journals, and is in the editorial boards and
program committees of several top journals and conferences.
Mukhopadhyay is the recipient of the prestigious Shanti Swarup
Bhatnagar Award 2021 for Science and Technology (highest science
honor in India below the age of 45) and is a Fellow of the
Indian National Academy of Engineers, and Fellow of the
Asia-Pacific Artificial Intelligence Association (AAIA) for
contributions to Information Security.
He is also a fellow of C3iHub (Cyber Security and Cyber Security
for Cyber-Physical Systems) Innovation Hub of IIT Kanpur, and
has been enlisted in Asia's most outstanding researchers
compiled by Asian Scientist Magazine.
He was awarded the Qualcomm Faculty Award 2022, Khosla National
Award from IIT Roorkee 2021, DST Swarnajayanti Fellowship
2015-16, INSA Young Scientist award, INAE Young Engineer award,
and Associateship for the Indian Academy of Sciences and is a
senior member of IEEE/ACM.
Tutorials

Dr. Divya Ravi
University of Amsterdam, Netherlands
Title: Foundations of Secure Multi-party Computation
Abstract: Traditionally, cryptography is used to protect data in transit from an eavesdropping adversary. With the advent of big data and large-scale computation, cryptography can offer us much more. A cryptographic tool called Secure Multi- party Computation (MPC) allows a set of mutually distrusting entities to compute a combined function on their private inputs, with the guarantee that nothing beyond the output of the computation is revealed. The current and potential impact of MPC is widespread in real-life applications where data sharing is constrained due to legal, ethical or privacy reasons.
In this tutorial, we will learn the foundations of MPC protocols. In particular, we focus on two types of standard approaches used in the design of MPC protocols: secret-sharing based and garbled-circuit based protocols.
Bio: Divya Ravi is currently an Assistant Professor in the Complex Cyber Infrastructure (CCI) Group at University of Amsterdam, Netherlands.
Previously, she was a post-doctoral researcher in the Cryptography and Security Group at Aarhus University, Denmark. she received her PhD at Indian Institute of Science (IISc), Bangalore, India where she was supervised by Dr. Arpita Patra . She completed M.E (Masters) in Computer Science from CSA, IISc and B.E (Bachelors) in Computer Science from BITS Pilani, Hyderabad Campus, India.
Her research interests primarily include Secure Multi-party Computation and Distributed Computing.
More specifically, she is interested in finding solutions to intriguing questions such as the feasibility of tasks related to secure multiparty computation (MPC) and construction of efficient distributed computing protocols under different settings of network and computational models
More about her reserach is available here

Dr. Subhadeep Banik
University of Lugano, Switzerland
Title: HARDWARE SOLVERS OVER GF(2)
Abstract: It is well known that linear equations over any finite field can be solved using Gaussian Elimination (GE) efficiently. GE is even more efficient to implement in hardware, and there have been numerous architectures proposed for it.
Regarding higher degree equations, the hardware architecture proposed in BCC+13 uses gray code based search to solve only quadratic equations. The idea is to efficiently traverse the space of potential solutions via a graycode path, which takes much less computational load than traversing it lexicographically. But this architecture is limited to degree 2 equations and so for a while solving higher degree equation system efficiently in hardware was an open problem.
Möbius transform is a linear circuit used to compute the
evaluations of a Boolean function over all points on its input
domain. The operation is very useful in finding the solution of
a system of polynomial equations over GF (2) for obvious
reasons. However the operation, although linear, needs
exponential number of logic operations (around $n \cdot 2^{n−1}$
bit xors) for an n-variable Boolean function. As such the only
known hardware circuit to efficiently compute the Möbius
Transform requires silicon area that is exponential in n. For
Boolean functions whose algebraic degree is bound by some
parameter d, recursive definitions of the Möbius Transform exist
that requires only O(n^{d+1} ) space in software. However
converting the mathematical definition of this space-efficient
algorithm into a hardware architecture is a non-trivial task,
primarily because the recursion calls notionally lead to a
depth-first search in a transition graph that requires context
switches at each recursion call for which straightforward
mapping in hardware is difficult. In this paper we look to
overcome these very challenges in an engineering sense. We
propose a space efficient sequential hardware circuit for the
Möbius Transform that requires only polynomial circuit area
(i.e. O(n^{d+1} )) provided the algebraic degree of the Boolean
function is limited to d. We show how this circuit can be used
as a component to efficiently solve polynomial equations of
degree at most d by using fast exhaustive search. We propose
three different circuit architectures for this, each of which
uses the Möbius Transform circuit as a core component. We show
that asymptotically, all the solutions of a system of m
polynomials in n unknowns and algebraic degree d over GF (2) can
be found using a circuit of silicon area proportional to $m
\cdot n^{d+1}$ and circuit depth proportional to $2 \cdot \log_2
(n - d)$.
We then introduce the architecture Polysolve4, a hardware solver
that additionally aims to achieve energy efficiency. The main
idea is we reduce the solution space to a small enough value by
parallel application of Möbius Transform circuits over the first
few equations of the system. This is done so that one can check
individually whether the vectors of this reduced solution space
satisfy each of the remaining equations of the system using
lower power consumption. The new circuit has area also bound by
$m \cdot n^{d+1}$ and has circuit depth proportional to $d \cdot
log_2 n$. We also show that further optimizations wrt energy may
be obtained by using depth-bound Möbius circuits that
exponentially decrease run time at the cost of additional logic
area and depth.
Bio: Subhadeep Banik completed his B.Tech in Electronics and Electrical Communication Engineering and M.Tech in Automation and Computer Vision from the Indian Institute of Technology at Kharagpur in 2006. He received his PhD in Computer Science from the Indian Statistical Institute, Kolkata in 2015.
He was a Post Doctoral Researcher in DTU Compute at Lyngby and at Temasek Labs, NTU Singapore. He worked as an Ambizione fellow in the LASEC group in Ecole Polytechnique Federale de Lausanne since June 2017.He is currently at USi in Lugano.
More about his research is available here
Venue
The conference will be held at Indian Institute of Technology, Roorkee campus
Indian Institute of Technology Roorkee,
Roorkee-247667, Uttarakhand, India
How to reach ?
Roorkee is well connected to Delhi by rail and road. It is situated
on National Highways 58 and 73 and is on Amritsar-Howrah main rail
route. Some trains which are convenient for travelling between Delhi
and Roorkee are New Delhi-Dehradun-New Delhi Shatabdi Express and
Dehradun-New Delhi-Dehradun Janshatabdi Express. The nearest airport
is located at Jollygrant, Dehradun. However, New Delhi is the
preferred airport. National Highway 58 from New Delhi to the higher
reaches of the Himalayas passes via Roorkee. Roorkee is, therefore,
well connected to all the major cities in the region by road. There
are frequent bus services to this place from the Maharana Pratap
Inter State Bus Terminal (Kashmere Gate) Delhi.
-
Roadways
Traveling from Delhi, Roorkee is located towards north approximately 170 kilometers. Take the highway NH58, and it passes through Roorkee. The city of Haridwar is located further on the same highway about 29 kilometers from Roorkee.
The main bus depot of Roorkee is located on NH58. Several buses run from various cities in North India. -
Railways
Easiest way to get to Roorkee is by train. There are several trains serving Roorkee daily from various cities around. The high speed trains Shatabdi and Jan Shatabti also stop at Roorkee on their route Delhi - Dehradun. By train, it takes less than 3 hours and 30 minutes to reach Roorkee from Delhi, so it is the fastest and most economical way of travel.
Incidentally, the first locomotive of India ran on rails in Roorkee in 1846, well before the first passenger rail that ran in Thane. -
Airways
Nearest airport to Roorkee is Dehradun's Jolly Grant airport. But most preferable airport nearest from Roorkee is the New Delhi International Airport which is about 180 kilometers away.
Accomodation
- IITR Guest House upon payment (subject to availability)
-
Nearby hotels
The conference will arrange transport between nearby hotels and the conference venue.
Recommended hotels:
Ambrosia Sarovar Portico, Haridwar
A Premium Hotel in Haridwar
NH 334, 12th Milestone, Badehri, Rajputna, PO: Patanjali Yogpeeth, Haridwar, Uttarakhand 249405+91 9536900146
Special rate for SPACE attendees
Promo Code - IITR
Check-in - 13 December
Check-out - 17 December
- Login to the site Sarovar Hotels
- Select Hotel Ambrosia Sarovar Portico, Haridwar
- Use promo code IITR & get your special rates for IIT Roorkee
Hotel Center Point, Roorkee
Set in a commercial area, this unpretentious hotel is 3 km from Roorkee railway station and 52 km from Rajaji National Park.