| Time | Event / Papers |
|---|---|
| 8:00 AM - 9:00 AM | Breakfast/Registration |
| 9:00 AM - 10:00 AM | Tutorial 1: Hardware Enhancements for Software Security – Chester Rebeiro, and Deepanjali S, IIT Madras |
| 10:00 AM - 10:30 AM | Tea Break |
| 10:30 AM - 12:00 PM | Tutorial 1: Hardware Enhancements for Software Security – Chester Rebeiro, and Deepanjali S, IIT Madras |
| 12:00 PM - 1:30 PM | Lunch Break |
| 1:30 PM - 3:00 PM | Tutorial 2: Firmware Reverse Engineering of IoT Devices – Santosh Sam Koshy, CDAC |
| 3:00 PM - 3:30 PM | Tea Break |
| 3:30 PM - 5:30 PM | Tutorial 2: Firmware Reverse Engineering of IoT Devices – Santosh Sam Koshy, CDAC |
| Time | Event / Papers |
|---|---|
| 7:30 AM to 10:00 AM | Campus Tour / Sports & Breakfast |
| 10:30 AM - 12:00 PM | Tutorial 3: Rust Programming Language – Yashwanth Singh M , Bosch |
| 12:00 PM - 1:30 PM | Lunch Break |
| 1:30 PM - 3:00 PM | Tutorial 3: Rust Programming Language – Yashwanth Singh M, Bosch |
| 3:00 PM - 3:30 PM | Tea Break |
| 3:30 PM - 5:30 PM | ISEA Workshop on Quantum-Era Security – Workshop Chair: Anupam Chattopadhyay
Talk 1: Number Theory Transforms in ML-KEM and ML-DSA (3:30 PM to 4:10 PM) Speaker: Dr. Martianus Frederic Ezerman (NTU Singapore) Talk 2: Unified FPGA Design of Kyber and Dilithium with Provable Fault Tolerance (4:10 PM to 4:50 PM) Speaker: Prof. Debdeep Mukhopadhyay (IIT Kharagpur) Talk 3: From Cryptographic Rigidity to Cryptographic Agility – A Measured Approach to Quantum-Safe Migration (4:50 PM to 5:30 PM) Speaker: Dr. Prasanna Ravi (Digital Trust Centre, NTU Singapore) |
| Time | Event / Papers |
|---|---|
| 7:30 AM - 8:30 AM | Breakfast/Registration |
| 8:30 AM - 9:00 AM | General Chairs' Introduction & TPC Chairs' Introduction |
| 9:00 AM - 10:00 AM | Keynote: Sandeep Shukla, IIIT Hyderabad – Session Chair: Chandan Karfa |
| 10:00 AM - 10:30 AM | Tea Break |
| 10:30 AM - 12:00 PM |
Session I: 4 Research Papers – Chair: Chandan Karfa Paper ID: 15 - Analyzing Non-linear Shift Register Transformations in the Design and Cryptanalysis of Espresso - Anirban Ghatak, Anupam Chattopadhyay, Ambrish Awasthi and Indivar Gupta (ISI, Kolkata; SAG, DRDO, India; NTU, Singapore) Paper ID: 29 - A keystream generator inspired by the experiment of drawing balls with replacement** - Ganesh Yellapu (Bharat Electronics Limited, Bangalore, India) Paper ID: 82 - A new perspective on the decomposition in the Jacobian of small genus hyperelliptic curve - Deepak Bhati and Shashank Singh (CISPA Helmholtz; IISER Bhopal, India) Paper ID: 66 - A Custom Entropy Harvester for Consistent Entropy Supply to the /dev/random** - Kunal Abhishek and Anuyog Chauhan (CDAC, Patna, India) |
| 12:00 PM - 1:00 PM | Panel Discussion - Privacy, Regulation, Technology & Practice
Panel members: Prof. Debdeep Mukhopadhay, Professor, IIT Kharagpur Dr. N Rajesh Pillai (Outstanding Scientist), Director SAG, DRDO Kishor Ananda, Principal Engineer/Manager, Qualcomm D V Srinivas Rao, Qclairvoyance Quantum Labs Pvt. Ltd. Moderator: Prof. Anupam Chattopadhyay, NTU, Singapore |
| 1:00 PM - 2:00 PM | Lunch Break |
| 2:00 PM - 3:30 PM | Industry Demo & Poster Session |
| 3:30 PM - 4:00 PM | Tea Break |
| 4:00 PM - 6:00 PM |
Session II: 5 Research Papers – Chair: Urbi Chatterjee Paper ID: 62 - High throughput 64-bit implementation of SNOW-V stream cipher** - Kakumani Kushalram, Majji Harsha Vardhan and Raghvendra Rohit (IIT Roorkee, India) Paper ID: 99 - A Multi-View Contrastive Graph Neural Network Framework for Binary Malware Detection in IoMT environments** - Bhagyasri Bora, Saunav Barman, Rahul Bardhan, Dharitri Brahma and Amitava Nag (Central Institute of Technology, Kokrajhar, India) Paper ID: 58 - Sample Similarity based Incremental Clustering: An Effective Methodology for Anomaly Detection in Networks - Arun K, Ardra V S and Aji S (University of Kerala, India) Paper ID: 37 - Breaking PCB-Chain: A Side Channel Assisted Attack on IoT-Friendly Blockchain Mining - Shubhankar Gambhir, Vishesh Mishra, Urbi Chatterjee and Debapriya Basu Roy (IIT Kanpur, India) Paper ID: 84 - Addressing Cache Side-Channel Attacks using Taint-guided Fine-grained Computation Offloading in Near-Memory Processing** - Simran Preet Kaur, Asutosh Kumar Sarma, Satanu Maity and Manojit Ghose (IIIT Guwahati, India) |
| 6:00 PM - 8:00 PM | Cultural Program & Prize Distribution |
| 8:00 PM - 9:00 PM | Gala Dinner |
| Time | Event / Papers |
|---|---|
| 8:00 AM - 9:00 AM | Breakfast/Registration |
| 9:00 AM - 10:00 AM | Keynote: Sikhar Patranabis, IBM – Session Chair: Debdeep Mukhopadhyay |
| 10:00 AM - 10:30 AM | Tea Break |
| 10:30 AM - 12:20 PM |
Session III: 4 Research Papers & Invited Talk – Chair: Subhadeep Banik Paper ID: 107 - PAC-Guided Design Strategies for Resilient Priority Arbiter PUFs - Durba Chatterjee, Simranjeet Singh, Debdeep Mukhopadhyay, Farhad Merchant and Anupam Chattopadhyay (Radboud University, Netherlands; Forschungszentrum Jülich, Germany; IIT Kharagpur, India; University of Groningen, Netherlands; NTU, Singapore) Paper ID: 96 - Enhanced Hardware Trojan Detection with XGBoost Graph Learning: A Glass Box Approach - C Sneha and M Nirmala Devi (PES University, India) Paper ID: 38 - MLP is better than ResNet on ANSSI’s Protected AES Implementation on ARM - Surya Prakash Mishra, Akash Gupta and Atul Prakash (SAG, DRDO, India; Ministry of Defense, India) Paper ID: 90 - Hard-to-Find Bugs in Public-Key Cryptographic Software: Classification and Test Methodologies - Matteo Steinbach, Johann Groszschaedl and Peter Roenne (University of Luxembourg, Luxembourg) Invited Talk: Applied Cryptography - SoCs, Speakers: Harish Potluri and Anurag Srivastava, Qualcomm |
| 12:20 PM - 1:30 PM | Lunch Break |
| 1:30 PM - 3:00 PM |
Session IV: 4 Research Papers – Chair: Chester Rebeiro Paper ID: 78 - Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization - Tarun Yadav, Shweta Singh and Sudha Yadav (DRDO, India) Paper ID: 76 - Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection - Subeen Cho, Yulim Hyoung, Hagyeong Kim, Minjoo Sim, Anupam Chattopadhyay, Hwajeong Seo and Hyunji Kim (Hansung University, S. Korea; NTU, Singapore) Paper ID: 49 - Efficient Time Share Masking of AES - Subhadeep Banik and Francesco Regazzoni (University of Lugano, Switzerland; University of Amsterdam, Netherlands) Paper ID: 21 - Secure Secret Sharing Protocol Against Network Data Remanence Side Channel Attacks - Prajwal Thakare, Akash Om Trivedi and Urbi Chatterjee (IIT Kanpur, India) |
| 3:00 PM - 3:30 PM | Tea Break |
| 3:30 PM - 5:30 PM |
Session V: 5 Research Papers – Chair: Debapriya Basu Roy Paper ID: 70 - Investigation on the Impact of Practical Fault Model for Commercial Edge Machine Learning Devices - Shivam Bhasin, Dirmanto Jap, Marina Krček and Stjepan Picek (NTU, Singapore; Radboud University, Netherlands) Paper ID: 53 - A Security Analysis of CNN Partitioning Strategies for Distributed Inference at the Edge - Fatemeh Mehrafrooz, Roozbeh Siyadatzadeh, Nele Mentens and Todor Stefanov (Leiden University, Netherlands; KU Leuven, Belgium) Paper ID: 13 - GhostWriter: Exploiting GPU-Cache Contention to Steal and Steer Multi-Tenant Large-Language-Model Inference - Satyajit Das and Sreenath Vijayakumar (IIT Palakkad, India) Paper ID: 80 - Gradient-Guided Adversarial Patch Attack for Deep Neural Networks - Rishav Kumar, Umesh Kashyap and Sk. Subidh Ali (IIT Bhilai, India) Paper ID: 26 - VulScan-LT: A Lightweight Transformer-based Software Vulnerability Scanning Tool for Resource-Constrained Edge Devices - Dev Saini, Vivek Chaturvedi and Muhammad Shafique (IIT Palakkad, India; NYU Abu Dhabi, UAE) |
| Time | Event |
|---|---|
| 6:00 AM - 5:00 PM | Sightseeing Tour |