| Publication | Date of Publication | Type |
|---|
| Formal analysis of PUF instances leveraging correlation-spectra in Boolean functions | 2024-03-12 | Paper |
Differential fault attack on SKINNY block cipher Security, Privacy, and Applied Cryptography Engineering | 2023-11-01 | Paper |
Template-based fault injection analysis of block ciphers Security, Privacy, and Applied Cryptography Engineering | 2023-11-01 | Paper |
Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers Security, Privacy, and Applied Cryptography Engineering | 2023-08-04 | Paper |
Learn from your faults: leakage assessment in fault attacks using deep learning Journal of Cryptology | 2023-07-05 | Paper |
TransNet: shift invariant transformer network for side channel analysis Progress in Cryptology - AFRICACRYPT 2022 | 2023-06-02 | Paper |
Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks Lecture Notes in Computer Science | 2023-05-12 | Paper |
FlexiPair: An Automated Programmable Framework for Pairing Cryptosystems IEEE Transactions on Computers | 2022-08-05 | Paper |
| \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study | 2022-06-17 | Paper |
| Fault template attacks on block ciphers exploiting fault propagation | 2021-12-01 | Paper |
Petrel: Power and Timing Attack Resistant Elliptic Curve Scalar Multiplier Based on Programmable ${\rm GF}(p)$ Arithmetic Unit IEEE Transactions on Circuits and Systems I: Regular Papers | 2021-08-26 | Paper |
A formal analysis of prefetching in profiled cache-timing attacks on block ciphers Journal of Cryptology | 2021-07-30 | Paper |
Branch Prediction Attack on Blinded Scalar Multiplication IEEE Transactions on Computers | 2020-10-02 | Paper |
| Function private predicate encryption for low min-entropy predicates | 2020-01-28 | Paper |
SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations IEEE Transactions on Computers | 2020-01-28 | Paper |
Identity-based key aggregate cryptosystem from multilinear maps Advances in Mathematics of Communications | 2019-09-19 | Paper |
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis IEEE Transactions on Computers | 2019-03-29 | Paper |
| Fault based almost universal forgeries on CLOC and SILC | 2018-10-26 | Paper |
A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security IEEE Transactions on Computers | 2018-06-27 | Paper |
| Lightweight design choices for LED-like block ciphers | 2018-04-26 | Paper |
| Who watches the watchmen?: Utilizing performance monitors for compromising keys of RSA on intel platforms | 2018-02-14 | Paper |
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud IEEE Transactions on Computers | 2017-08-25 | Paper |
Construction of Rotation Symmetric S-Boxes with High Nonlinearity and Improved DPA Resistivity IEEE Transactions on Computers | 2017-06-08 | Paper |
Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation IEEE Transactions on Computers | 2017-05-16 | Paper |
Redefining the transparency order Designs, Codes and Cryptography | 2017-02-10 | Paper |
ECC on your fingertips: a single instruction approach for lightweight ECC design in \(\mathrm{GF}(p)\) Lecture Notes in Computer Science | 2016-05-19 | Paper |
On the optimal pre-processing for non-profiling differential power analysis Constructive Side-Channel Analysis and Secure Design | 2016-03-10 | Paper |
Dynamic key-aggregate cryptosystem on elliptic curves for online data sharing Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Multivariate leakage model for improving non-profiling DPA on noisy power traces Information Security and Cryptology | 2015-12-02 | Paper |
Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers Cryptography and Communications | 2015-11-18 | Paper |
Khudra: A New Lightweight Block Cipher for FPGAs Security, Privacy, and Applied Cryptography Engineering | 2015-09-18 | Paper |
Destroying fault invariant with randomization. A countermeasure for AES against differential fault attacks Advanced Information Systems Engineering | 2015-07-21 | Paper |
DRECON: DPA resistant encryption by construction Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Improved differential cache attacks on SMS4 Information Security and Cryptology | 2013-05-28 | Paper |
Differential Fault Analysis of Twofish Information Security and Cryptology | 2013-05-28 | Paper |
| CAvium -- strengthening Trivium stream cipher using cellular automata | 2013-04-03 | Paper |
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines Lecture Notes in Computer Science | 2011-12-16 | Paper |
An improved differential fault analysis on AES-256 Lecture Notes in Computer Science | 2011-06-29 | Paper |
Cryptanalysis of CLEFIA using differential methods with cache trace patterns Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
High speed flexible pairing cryptoprocessor on FPGA platform Lecture Notes in Computer Science | 2010-11-26 | Paper |
| Group properties of nonlinear cellular automata | 2010-01-04 | Paper |
Cache timing attacks on Clefia Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
An Improved Fault Based Attack of the Advanced Encryption Standard Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks Lecture Notes in Computer Science | 2008-04-11 | Paper |
Characterization of a Class of Complemented Group Cellular Automata Lecture Notes in Computer Science | 2005-08-17 | Paper |