2024
A Configurable CRYSTALS-Kyber Hardware Implementation with Side-Channel Protection.
ACM Trans. Embed. Comput. Syst., March, 2024
EFFLUX-F2: A High Performance Hardware Security Evaluation Board.
IACR Cryptol. ePrint Arch., 2024
Achilles Heel in Secure Boot: Breaking RSA Authentication and Bitstream Recovery from Zynq-7000 SoC.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Formal Verification of Secure Boot Process.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
2023
Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium.
IEEE Trans. Circuits Syst. I Regul. Pap., 2023
Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software.
IACR Cryptol. ePrint Arch., 2023
AI Attacks AI: Recovering Neural Network architecture from NVDLA using AI-assisted Side Channel Attack.
IACR Cryptol. ePrint Arch., 2023
BAKSHEESH: Similar Yet Different From GIFT.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
IACR Cryptol. ePrint Arch., 2023
CRYSTALS-Dilithium on RISC-V Processor: Lightweight Secure Boot Using Post-Quantum Digital Signature.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023
2021
PQC Acceleration Using GPUs: FrodoKEM, NewHope, and Kyber.
IEEE Trans. Parallel Distributed Syst., 2021
MemEnc: A Lightweight, Low-Power, and Transparent Memory Encryption Engine for IoT.
IEEE Internet Things J., 2021
2020
Threshold Implementations of <tt>GIFT</tt>: A Trade-Off Analysis.
IEEE Trans. Inf. Forensics Secur., 2020
2019
A Generalized Format Preserving Encryption Framework Using MDS Matrices.
J. Hardw. Syst. Secur., 2019
Cryptanalytic time-memory trade-off for password hashing schemes.
Int. J. Inf. Sec., 2019
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor.
IACR Cryptol. ePrint Arch., 2019
2017
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes.
IACR Cryptol. ePrint Arch., 2017
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017
2016
Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Performance Analysis of Some Password Hashing Schemes.
IACR Cryptol. ePrint Arch., 2015
Rig: A simple, secure and flexible design for Password Hashing.
IACR Cryptol. ePrint Arch., 2015
2014
Cryptographic Module Based Approach for Password Hashing Schemes.
Proceedings of the Technology and Practice of Passwords, 2014