| Publication | Date of Publication | Type |
|---|
| Formal analysis of PUF instances leveraging correlation-spectra in Boolean functions | 2024-03-12 | Paper |
| Differential fault attack on SKINNY block cipher | 2023-11-01 | Paper |
| Template-based fault injection analysis of block ciphers | 2023-11-01 | Paper |
| Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers | 2023-08-04 | Paper |
| Learn from your faults: leakage assessment in fault attacks using deep learning | 2023-07-05 | Paper |
| TransNet: shift invariant transformer network for side channel analysis | 2023-06-02 | Paper |
| Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks | 2023-05-12 | Paper |
| FlexiPair: An Automated Programmable Framework for Pairing Cryptosystems | 2022-08-05 | Paper |
| \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study | 2022-06-17 | Paper |
| Fault template attacks on block ciphers exploiting fault propagation | 2021-12-01 | Paper |
| Petrel: Power and Timing Attack Resistant Elliptic Curve Scalar Multiplier Based on Programmable ${\rm GF}(p)$ Arithmetic Unit | 2021-08-26 | Paper |
| A formal analysis of prefetching in profiled cache-timing attacks on block ciphers | 2021-07-30 | Paper |
| Branch Prediction Attack on Blinded Scalar Multiplication | 2020-10-02 | Paper |
| Function private predicate encryption for low min-entropy predicates | 2020-01-28 | Paper |
| SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations | 2020-01-28 | Paper |
| Identity-based key aggregate cryptosystem from multilinear maps | 2019-09-19 | Paper |
| CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis | 2019-03-29 | Paper |
| Fault based almost universal forgeries on CLOC and SILC | 2018-10-26 | Paper |
| A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security | 2018-06-27 | Paper |
| Lightweight design choices for LED-like block ciphers | 2018-04-26 | Paper |
| Who watches the watchmen?: Utilizing performance monitors for compromising keys of RSA on intel platforms | 2018-02-14 | Paper |
| Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud | 2017-08-25 | Paper |
| Construction of Rotation Symmetric S-Boxes with High Nonlinearity and Improved DPA Resistivity | 2017-06-08 | Paper |
| Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation | 2017-05-16 | Paper |
| Redefining the transparency order | 2017-02-10 | Paper |
| ECC on your fingertips: a single instruction approach for lightweight ECC design in \(\mathrm{GF}(p)\) | 2016-05-19 | Paper |
| On the optimal pre-processing for non-profiling differential power analysis | 2016-03-10 | Paper |
| Dynamic key-aggregate cryptosystem on elliptic curves for online data sharing | 2016-01-12 | Paper |
| Multivariate leakage model for improving non-profiling DPA on noisy power traces | 2015-12-02 | Paper |
| Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers | 2015-11-18 | Paper |
| Khudra: A New Lightweight Block Cipher for FPGAs | 2015-09-18 | Paper |
| Destroying fault invariant with randomization. A countermeasure for AES against differential fault attacks | 2015-07-21 | Paper |
| DRECON: DPA resistant encryption by construction | 2014-06-24 | Paper |
| Improved differential cache attacks on SMS4 | 2013-05-28 | Paper |
| Differential Fault Analysis of Twofish | 2013-05-28 | Paper |
| CAvium -- strengthening Trivium stream cipher using cellular automata | 2013-04-03 | Paper |
| Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs | 2012-11-13 | Paper |
| An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines | 2011-12-16 | Paper |
| An improved differential fault analysis on AES-256 | 2011-06-29 | Paper |
| Cryptanalysis of CLEFIA using differential methods with cache trace patterns | 2011-02-11 | Paper |
| High speed flexible pairing cryptoprocessor on FPGA platform | 2010-11-26 | Paper |
| Group properties of nonlinear cellular automata | 2010-01-04 | Paper |
| Cache timing attacks on Clefia | 2009-12-17 | Paper |
| An Improved Fault Based Attack of the Advanced Encryption Standard | 2009-07-07 | Paper |
| High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms | 2009-01-22 | Paper |
| Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures | 2009-01-22 | Paper |
| LFSR Based Stream Ciphers Are Vulnerable to Power Attacks | 2008-04-11 | Paper |
| Characterization of a Class of Complemented Group Cellular Automata | 2005-08-17 | Paper |