--------------------------------------------------------------------- SPACE 2021 call for Posters December 10 -- 13, 2021, Virtual Conference https://cse.iitkgp.ac.in/conf/SPACE2021/ --------------------------------------------------------------------- === COVID 19 advisory === Given the current uncertainty with travel and event organization restrictions caused by COVID-19, SPACE 2021 might be either a virtual or a hybrid-mode conference. SPACE 2021 will allow the online presentation of accepted posters. === Posters submission === International Conference on Security, Privacy and Applied Cryptographic Engineering 2021 (SPACE 2021) is eleventh in the series of conferences, which started in 2021. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This year, we are organizing a poster session for showcasing works in progress for early-stage work in security and cryptographic engineering. The submissions will be non-archival and accepted posters will only be presented to the conference attendees. We invite young researchers (students, researchers who have recently completed their degree, researchers working in academia, industry or elsewhere) to present their ongoing research projects, challenges dealt with in their research domain and prospective new research directions that are in-line with the theme of the conference. The submissions will go through a light peer review process. Note that the first author of a poster submission should be a student. === Submission instructions === The poster authors need to submit a title, names of authors/affiliations and an abstract (maximum 300 words) via email to SPACE 2021 email address: space2021@easychair.org. The deadline for submission is December 1, 2021. We will contact successful poster submissions with presentation instructions. === Topics === Topic of posters include but are not limited to: Cryptographic Engineering * Design of Cryptographic Primitives * Random Number Generators and PUF * Cryptographic Protocols and Implementations * Security Architectures * Formal Methods in Cryptographic Engineering * Attacks and Countermeasures * Post-quantum Cryptography Implementations * Cryptographic Software/Hardware Design * IP Protection Physical attacks and Countermeasures * Fault Analysis and Countermeasures * Reverse Engineering and Tampering * Hardware Trojans and Counterfeit Detection * Side-channel Analysis and Countermeasures * Micro-Architectural Attacks * AI-assisted side-channel and fault attacks * Cryptanalysis Security and Privacy * Security of Cyber-Physical Systems * AI in security and privacy * Security of AI * Secure Networking Protocols * Securing Human-in-the-loop Systems * Data privacy and Authentication * Botnets and Malware * Anonymization Techniques and Attacks * Intrusion Detection * Operating Systems Security * Trustworthy Computing * Verification and Testing for Security