Symmetric Cryptography.- Computing the Distribution of Differentials over the Non-linear Mapping .- Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security.- LP Based Differential Attack on Round Reduced WARP.- Post-quantum cryptography and homomorphic encryption.- SHELBRS: Location-Based Recommendation Services using Switchable Homomorphic Encryption.- On Threat of Hardware Trojan To Post-Quantum Lattice-based Schemes: A Key Recovery Attack on SABER and beyond.- Safe-Error Attacks on SIKE and CSIDH.- Hardware security and side-channel attacks.- Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV.- Parasite: Mitigating Physical Side-channel Attacks against Neural Networks.- Reinforcement Learning-based Design of Side-channel Countermeasures.- Deep Freezing Attacks on Capacitors and Electronic Circuits.- AI and Cloud security.- Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database .- Robustness Against Adversarial Attacks using Dimensionality.- SoK - Network Intrusion Detection on FPGA.