Dillibabu Shanmugam

According to our database1, Dillibabu Shanmugam authored at least 13 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FaultDetective Explainable to a Fault, from the Design Layout to the Software.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
Improving Side-channel Leakage Assessment Using Pre-silicon Leakage Models.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023

2022
Robust message authentication in the context of quantum key distribution.
Int. J. Inf. Comput. Secur., 2022

2020
Implementation Vulnerability Analysis: A case study on ChaCha of SPHINCS.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2020

2019
Denial of Service Detection System on various platforms.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019

2018
Secure Realization of Lightweight Block Cipher: A Case Study Using GIFT.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018

Crypto Primitives IPCore Implementation Susceptibility in Cyber Physical System.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2018

2017
IPcore implementation susceptibility: A case study of Low latency ciphers.
IACR Cryptol. ePrint Arch., 2017

2016
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE.
IACR Cryptol. ePrint Arch., 2016

2015
Secure Implementation of Stream Cipher: Trivium.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

Vulnerability Analysis of PRINCE and RECTANGLE using CPA.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA.
IACR Cryptol. ePrint Arch., 2014

Differential Power Analysis Attack on SIMON and LED Block Ciphers.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014


  Loading...