What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Debdeep Mukhopadhyay
Google Scholar
84
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Highly Scalable Searchable Symmetric Encryption for Boolean Queries from NTRU Lattice Trapdoors.
Debadrita Talapatra
Sikhar Patranabis
Debdeep Mukhopadhyay
2025
conf/asiaccs
Pay What You Spend! Privacy-Aware Real-Time Pricing with High Precision IEEE 754 Floating Point Division.
Soumyadyuti Ghosh
Harishma Boyapally
Ajith Suresh
Arpita Patra
Soumyajit Dey
Debdeep Mukhopadhyay
2025
conf/asiaccs
An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph Optimization.
Animesh Singh
Ayantika Chatterjee
Anupam Chattopadhyay
Debdeep Mukhopadhyay
2025
conf/asiaccs
Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption.
Debadrita Talapatra
Nimish Mishra
Debdeep Mukhopadhyay
2025
conf/esorics
TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications.
Chandan Kumar
Nimish Mishra
Suvradip Chakraborty
Satrajit Ghosh
Debdeep Mukhopadhyay
2025
conf/uss
Systematic Evaluation of Randomized Cache Designs against Cache Occupancy.
Anirban Chakraborty
Nimish Mishra
Sayandeep Saha
Sarani Bhattacharya
Debdeep Mukhopadhyay
2025
conf/acns
NETLAM: An Automated LLM Framework to Generate and Evaluate Stealthy Hardware Trojans.
Tishya Sarma Sarkar
Kislay Arya
Siddhartha Chowdhury
Upasana Mandal
Shubhi Shukla
Sarani Bhattacharya
Debdeep Mukhopadhyay
2024
journals/tches
CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs.
Nimish Mishra
Kuheli Pratihar
Satota Mandal
Anirban Chakraborty
Ulrich Rührmair
Debdeep Mukhopadhyay
2024
journals/tches
EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis.
Suvadeep Hajra
Siddhartha Chowdhury
Debdeep Mukhopadhyay
2024
journals/tches
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM.
Suparna Kundu
Siddhartha Chowdhury
Sayandeep Saha
Angshuman Karmakar
Debdeep Mukhopadhyay
Ingrid Verbauwhede
2024
journals/cic
Compact Key Function Secret Sharing with Non-linear Decoder.
Chandan Kumar
Sikhar Patranabis
Debdeep Mukhopadhyay
2024
journals/tifs
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis.
Suvadeep Hajra
Manaar Alam
Sayandeep Saha
Stjepan Picek
Debdeep Mukhopadhyay
2024
journals/tifs
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs.
Durba Chatterjee
Kuheli Pratihar
Aritra Hazra
Ulrich Rührmair
Debdeep Mukhopadhyay
2024
conf/uss
Shesha : Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors.
Anirban Chakraborty
Nimish Mishra
Debdeep Mukhopadhyay
2024
conf/acns
Physically Unclonable Fingerprints for Authentication.
Navajit Singh Baban
Jiarui Zhou
Sarani Bhattacharya
Urbi Chatterjee
Sukanta Bhattacharjee
Sanjairaj Vijayavenkataraman
Yong-Ak Song
Debdeep Mukhopadhyay
Krishnendu Chakrabarty
Ramesh Karri
2024
conf/acns
"Hello? Is There Anybody in There?" Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure.
Soumyadyuti Ghosh
Manaar Alam
Soumyajit Dey
Debdeep Mukhopadhyay
2024
conf/acns
Efficient Quantum-Safe Distributed PRF and Applications: Playing DiSE in a Quantum World.
Sayani Sinha
Sikhar Patranabis
Debdeep Mukhopadhyay
2024
conf/eurosp
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE.
Animesh Singh
Smita Das
Anirban Chakraborty
Rajat Sadhukhan
Ayantika Chatterjee
Debdeep Mukhopadhyay
2024
conf/esorics
"Ask and Thou Shall Receive": Reaction-Based Full Key Recovery Attacks on FHE.
Bhuvnesh Chaturvedi
Anirban Chakraborty
Ayantika Chatterjee
Debdeep Mukhopadhyay
2024
conf/host
Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel Processors.
Nimish Mishra
Tridib Lochan Dutta
Shubhi Shukla
Anirban Chakraborty
Debdeep Mukhopadhyay
2024
conf/host
Cache Wars: A Comparative Study of UMWAIT, UMONITOR, and Prime-Probe Attacks.
Upasana Mandal
Sarani Bhattacharya
Debdeep Mukhopadhyay
2024
conf/asiaccs
Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy.
Arnab Bag
Sikhar Patranabis
Debdeep Mukhopadhyay
2024
conf/ndss
Faults in Our Bus: Novel Bus Fault Attack to Break ARM TrustZone.
Nimish Mishra
Anirban Chakraborty
Debdeep Mukhopadhyay
2024
conf/cans
On the Security of Privacy-Preserving Machine Learning Against Model Stealing Attacks.
Bhuvnesh Chaturvedi
Anirban Chakraborty
Ayantika Chatterjee
Debdeep Mukhopadhyay
2023
journals/tches
"Whispering MLaaS" Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks.
Shubhi Shukla
Manaar Alam
Sarani Bhattacharya
Pabitra Mitra
Debdeep Mukhopadhyay
2023
journals/tifs
Commitments via Physically Related Functions.
Harishma Boyapally
Sikhar Patranabis
Debdeep Mukhopadhyay
2023
journals/popets
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries.
Arnab Bag
Debadrita Talapatra
Ayushi Rastogi
Sikhar Patranabis
Debdeep Mukhopadhyay
2023
journals/joc
Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning.
Sayandeep Saha
Manaar Alam
Arnab Bag
Debdeep Mukhopadhyay
Pallab Dasgupta
2023
conf/eurosp
Conjunctive Searchable Symmetric Encryption from Hard Lattices.
Debadrita Talapatra
Sikhar Patranabis
Debdeep Mukhopadhyay
2022
journals/tifs
Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange.
Durba Chatterjee
Harishma Boyapally
Sikhar Patranabis
Urbi Chatterjee
Aritra Hazra
Debdeep Mukhopadhyay
2022
conf/ccs
ASHES 2022 - 6th Workshop on Attacks and Solutions in Hardware Security.
Chip-Hong Chang
Domenic Forte
Debdeep Mukhopadhyay
Ulrich Rührmair
2022
conf/africacrypt
TransNet: Shift Invariant Transformer Network for Side Channel Analysis.
Suvadeep Hajra
Sayandeep Saha
Manaar Alam
Debdeep Mukhopadhyay
2021
journals/tches
RASSLE: Return Address Stack based Side-channel LEakage.
Anirban Chakraborty
Sarani Bhattacharya
Manaar Alam
Sikhar Patranabis
Debdeep Mukhopadhyay
2021
journals/tifs
3PAA: A Private PUF Protocol for Anonymous Authentication.
Urbi Chatterjee
Debdeep Mukhopadhyay
Rajat Subhra Chakraborty
2021
journals/joc
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers.
Chester Rebeiro
Debdeep Mukhopadhyay
2021
conf/acns
A Good Anvil Fears No Hammer: Automated Rowhammer Detection Using Unsupervised Deep Learning.
Anirban Chakraborty
Manaar Alam
Debdeep Mukhopadhyay
2021
conf/acns
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain.
Soumyadyuti Ghosh
Urbi Chatterjee
Durba Chatterjee
Rumia Masburah
Debdeep Mukhopadhyay
Soumyajit Dey
2021
conf/ndss
Forward and Backward Private Conjunctive Searchable Symmetric Encryption.
Sikhar Patranabis
Debdeep Mukhopadhyay
2021
conf/asiacrypt
Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks.
Sayandeep Saha
Arnab Bag
Dirmanto Jap
Debdeep Mukhopadhyay
Shivam Bhasin
2020
journals/tifs
A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction.
Sayandeep Saha
Dirmanto Jap
Debapriya Basu Roy
Avik Chakraborty
Shivam Bhasin
Debdeep Mukhopadhyay
2020
conf/ccs
Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped Executions.
Sunandan Adhikary
Ipsita Koley
Saurav Kumar Ghosh
Sumana Ghosh
Soumyajit Dey
Debdeep Mukhopadhyay
2020
conf/eurocrypt
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.
Sayandeep Saha
Arnab Bag
Debapriya Basu Roy
Sikhar Patranabis
Debdeep Mukhopadhyay
2019
journals/tifs
Automatic Characterization of Exploitable Faults: A Machine Learning Approach.
Sayandeep Saha
Dirmanto Jap
Sikhar Patranabis
Debdeep Mukhopadhyay
Shivam Bhasin
Pallab Dasgupta
2019
conf/host
RATAFIA: Ransomware Analysis using Time And Frequency Informed Autoencoders.
Manaar Alam
Sarani Bhattacharya
Swastika Dutta
Sayan Sinha
Debdeep Mukhopadhyay
Anupam Chattopadhyay
2019
conf/pkc
Function Private Predicate Encryption for Low Min-Entropy Predicates.
Sikhar Patranabis
Debdeep Mukhopadhyay
Somindu C. Ramanna
2018
journals/tches
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers.
Sayandeep Saha
Debdeep Mukhopadhyay
Pallab Dasgupta
2018
journals/tosc
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.
Ashrujit Ghoshal
Rajat Sadhukhan
Sikhar Patranabis
Nilanjan Datta
Stjepan Picek
Debdeep Mukhopadhyay
2018
conf/ccs
Hardware Acceleration of Searchable Encryption.
Arnab Bag
Sikhar Patranabis
L. Tribhuvan
Debdeep Mukhopadhyay
2018
conf/ccs
Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
Shangqi Lai
Sikhar Patranabis
Amin Sakzad
Joseph K. Liu
Debdeep Mukhopadhyay
Ron Steinfeld
Shifeng Sun
Dongxi Liu
Cong Zuo
2018
conf/ccs
POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS.
Harishma Boyapally
Sikhar Patranabis
Urbi Chatterjee
Debdeep Mukhopadhyay
2018
conf/ches
Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms.
Manaar Alam
Debdeep Mukhopadhyay
Sai Praveen Kadiyala
Siew Kei Lam
Thambipillai Srikanthan
2018
conf/fdtc
Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel.
Sayandeep Saha
Dirmanto Jap
Jakub Breier
Shivam Bhasin
Debdeep Mukhopadhyay
Pallab Dasgupta
2017
journals/tifs
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers.
Sikhar Patranabis
Abhishek Chakraborty
Debdeep Mukhopadhyay
Partha Pratim Chakrabarti
2017
conf/ches
An Automated Framework for Exploitable Fault Identification in Block Ciphers - A Data Mining Approach.
Sayandeep Saha
Ujjawal Kumar
Debdeep Mukhopadhyay
Pallab Dasgupta
2017
conf/ches
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands.
Poulami Das
Debapriya Basu Roy
Debdeep Mukhopadhyay
2017
conf/host
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse.
Krishna Bagadia
Urbi Chatterjee
Debapriya Basu Roy
Debdeep Mukhopadhyay
Rajat Subhra Chakraborty
2017
conf/fdtc
A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20.
S. V. Dilip Kumar
Sikhar Patranabis
Jakub Breier
Debdeep Mukhopadhyay
Shivam Bhasin
Anupam Chattopadhyay
Anubhab Baksi
2017
conf/fdtc
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers.
Sikhar Patranabis
Jakub Breier
Debdeep Mukhopadhyay
Shivam Bhasin
2016
conf/ccs
Improved Atomicity to Prevent HCCA on NIST Curves.
Poulami Das
Debapriya Basu Roy
Debdeep Mukhopadhyay
2016
conf/ches
Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis.
Sarani Bhattacharya
Debdeep Mukhopadhyay
2016
conf/host
Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves.
Poulami Das
Debapriya Basu Roy
Harishma Boyapally
Debdeep Mukhopadhyay
2016
conf/host
Parsimonious design strategy for linear layers with high diffusion in block ciphers.
Sikhar Patranabis
Debapriya Basu Roy
Yash Shrivastava
Debdeep Mukhopadhyay
Santosh Ghosh
2016
conf/fdtc
Fault Tolerant Implementations of Delay-Based Physically Unclonable Functions on FPGA.
Durga Prasad Sahoo
Sikhar Patranabis
Debdeep Mukhopadhyay
Rajat Subhra Chakraborty
2015
conf/ches
Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability.
Sayandeep Saha
Rajat Subhra Chakraborty
Srinivasa Shashank Nuthakki
Anshul
Debdeep Mukhopadhyay
2015
conf/ches
Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms.
Sarani Bhattacharya
Debdeep Mukhopadhyay
2015
conf/host
A practical DPA on Grain v1 using LS-SVM.
Abhishek Chakraborty
Bodhisatwa Mazumdar
Debdeep Mukhopadhyay
2015
conf/sacrypt
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p).
Debapriya Basu Roy
Poulami Das
Debdeep Mukhopadhyay
2014
conf/ches
Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault Attacks.
Harshal Tupsamudre
Shikha Bisht
Debdeep Mukhopadhyay
2014
conf/host
Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA.
Durga Prasad Sahoo
Sayandeep Saha
Debdeep Mukhopadhyay
Rajat Subhra Chakraborty
Hitesh Kapoor
2014
conf/host
NREPO: Normal basis Recomputing with Permuted Operands.
Xiaofei Guo
Debdeep Mukhopadhyay
Chenglu Jin
Ramesh Karri
2014
conf/fdtc
Differential Fault Analysis on the Families of SIMON and SPECK Ciphers.
Harshal Tupsamudre
Shikha Bisht
Debdeep Mukhopadhyay
2014
conf/africacrypt
DRECON: DPA Resistant Encryption by Construction.
Suvadeep Hajra
Chester Rebeiro
Shivam Bhasin
Gaurav Bajaj
Sahil Sharma
Sylvain Guilley
Debdeep Mukhopadhyay
2013
journals/tifs
Constrained Search for a Class of Good Bijective S-Boxes With Improved DPA Resistivity.
Bodhisatwa Mazumdar
Debdeep Mukhopadhyay
Indranil Sengupta
2013
journals/tifs
Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks.
Chester Rebeiro
Phuong Ha Nguyen
Debdeep Mukhopadhyay
Axel Poschmann
2013
conf/host
Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience.
Bodhisatwa Mazumdar
Debdeep Mukhopadhyay
Indranil Sengupta
2013
conf/fdtc
Improved Differential Fault Analysis of CLEFIA.
Subidh Ali
Debdeep Mukhopadhyay
2012
journals/tifs
Boosting Profiled Cache Timing Attacks With A Priori Analysis.
Chester Rebeiro
Debdeep Mukhopadhyay
2012
conf/ches
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs.
Chester Rebeiro
Sujoy Sinha Roy
Debdeep Mukhopadhyay
2011
conf/ctrsa
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns.
Chester Rebeiro
Debdeep Mukhopadhyay
2011
conf/fdtc
A Differential Fault Analysis on AES Key Schedule Using Single Fault.
Subidh Ali
Debdeep Mukhopadhyay
2011
conf/africacrypt
An Improved Differential Fault Analysis on AES-256.
Subidh Ali
Debdeep Mukhopadhyay
2009
conf/africacrypt
An Improved Fault Based Attack of the Advanced Encryption Standard.
Debdeep Mukhopadhyay
2007
conf/acisp
Strengthening NLS Against Crossword Puzzle Attack.
Debojyoti Bhattacharya
Debdeep Mukhopadhyay
Dhiman Saha
Dipanwita Roy Chowdhury
2005
conf/iciss
CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks.
Debdeep Mukhopadhyay
Abhishek Chaudhary
Arvind Nebhnani
Dipanwita Roy Chowdhury
Coauthors
Abhishek Chakraborty
(2)
Abhishek Chaudhary
(1)
Ajith Suresh
(1)
Amin Sakzad
(1)
Angshuman Karmakar
(1)
Animesh Singh
(2)
Anirban Chakraborty
(10)
Anshul
(1)
Anubhab Baksi
(1)
Anupam Chattopadhyay
(3)
Aritra Hazra
(2)
Arnab Bag
(6)
Arpita Patra
(1)
Arvind Nebhnani
(1)
Ashrujit Ghoshal
(1)
Avik Chakraborty
(1)
Axel Poschmann
(1)
Ayantika Chatterjee
(4)
Ayushi Rastogi
(1)
Bhuvnesh Chaturvedi
(2)
Bodhisatwa Mazumdar
(3)
Chandan Kumar
(2)
Chenglu Jin
(1)
Chester Rebeiro
(6)
Chip-Hong Chang
(1)
Cong Zuo
(1)
Debadrita Talapatra
(4)
Debapriya Basu Roy
(8)
Debdeep Mukhopadhyay
(84)
Debojyoti Bhattacharya
(1)
Dhiman Saha
(1)
Dipanwita Roy Chowdhury
(2)
Dirmanto Jap
(4)
Domenic Forte
(1)
Dongxi Liu
(1)
Durba Chatterjee
(3)
Durga Prasad Sahoo
(2)
Gaurav Bajaj
(1)
Harishma Boyapally
(5)
Harshal Tupsamudre
(2)
Hitesh Kapoor
(1)
Indranil Sengupta
(2)
Ingrid Verbauwhede
(1)
Ipsita Koley
(1)
Jakub Breier
(3)
Jiarui Zhou
(1)
Joseph K. Liu
(1)
Kislay Arya
(1)
Krishna Bagadia
(1)
Krishnendu Chakrabarty
(1)
Kuheli Pratihar
(2)
L. Tribhuvan
(1)
Manaar Alam
(9)
Navajit Singh Baban
(1)
Nilanjan Datta
(1)
Nimish Mishra
(7)
Pabitra Mitra
(1)
Pallab Dasgupta
(5)
Partha Pratim Chakrabarti
(1)
Phuong Ha Nguyen
(1)
Poulami Das
(4)
Rajat Sadhukhan
(2)
Rajat Subhra Chakraborty
(5)
Ramesh Karri
(2)
Ron Steinfeld
(1)
Rumia Masburah
(1)
S. V. Dilip Kumar
(1)
Sahil Sharma
(1)
Sai Praveen Kadiyala
(1)
Sanjairaj Vijayavenkataraman
(1)
Santosh Ghosh
(1)
Sarani Bhattacharya
(9)
Satota Mandal
(1)
Satrajit Ghosh
(1)
Saurav Kumar Ghosh
(1)
Sayan Sinha
(1)
Sayandeep Saha
(14)
Sayani Sinha
(1)
Shangqi Lai
(1)
Shifeng Sun
(1)
Shikha Bisht
(2)
Shivam Bhasin
(7)
Shubhi Shukla
(3)
Siddhartha Chowdhury
(3)
Siew Kei Lam
(1)
Sikhar Patranabis
(22)
Smita Das
(1)
Somindu C. Ramanna
(1)
Soumyadyuti Ghosh
(3)
Soumyajit Dey
(4)
Srinivasa Shashank Nuthakki
(1)
Stjepan Picek
(2)
Subidh Ali
(3)
Sujoy Sinha Roy
(1)
Sukanta Bhattacharjee
(1)
Sumana Ghosh
(1)
Sunandan Adhikary
(1)
Suparna Kundu
(1)
Suvadeep Hajra
(4)
Suvradip Chakraborty
(1)
Swastika Dutta
(1)
Sylvain Guilley
(1)
Thambipillai Srikanthan
(1)
Tishya Sarma Sarkar
(1)
Tridib Lochan Dutta
(1)
Ujjawal Kumar
(1)
Ulrich Rührmair
(3)
Upasana Mandal
(2)
Urbi Chatterjee
(6)
Xiaofei Guo
(1)
Yash Shrivastava
(1)
Yong-Ak Song
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to