Janaka Alawatugoda

Orcid: 0000-0001-9431-5836

Affiliations:
  • University of Peradeniya, Sri Lanka
  • Griffith University, Australia


According to our database1, Janaka Alawatugoda authored at least 26 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
2
4
4
1
2
1
2
2
5
2
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deep Learning Model for Tamil Part-of-Speech Tagging.
Comput. J., 2024

Overall Survival Predictions of GBM Patients Using Radiomics: An Explainable AI Approach Using SHAP.
IEEE Access, 2024

2023
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions.
Cryptogr., March, 2023

Robust Cross Directional Controller Design for Paper Machine Spatial Distributed System.
IEEE Access, 2023

Mixed-Reality Based Multi-Agent Robotics Framework for Artificial Swarm Intelligence Experiments.
IEEE Access, 2023

Unveiling Copy-Move Forgeries: Enhancing Detection With SuperPoint Keypoint Architecture.
IEEE Access, 2023

2022
Correlation power analysis attack on software implementation of TRIVIUM stream cipher.
Int. J. Inf. Comput. Secur., 2022

On power analysis attacks against hardware stream ciphers.
Int. J. Inf. Comput. Secur., 2022

Standard model leakage-resilient authenticated key exchange using inner-product extractors.
Des. Codes Cryptogr., 2022

On Advances of Lattice-Based Cryptographic Schemes and Their Implementations.
Cryptogr., 2022

2021
Anonymous and Distributed Authentication for Peer-to-Peer Networks.
IACR Cryptol. ePrint Arch., 2021

2020
New approach to practical leakage-resilient public-key cryptography.
J. Math. Cryptol., 2020

Public-Key Encryption In The Standard Model Against Strong Leakage Adversary.
Comput. J., 2020

2019
Review on Leakage Resilient Key Exchange Security Model.
Int. J. Commun. Networks Inf. Secur., 2019

2017
On the leakage-resilient key exchange.
J. Math. Cryptol., 2017

Generic construction of an eCK -secure key exchange protocol in the standard model.
Int. J. Inf. Sec., 2017

Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting.
Proceedings of the Provable Security, 2017

Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack.
Proceedings of the 2017 IEEE International Conference on Industrial and Information Systems, 2017

2015
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange.
IACR Cryptol. ePrint Arch., 2015

Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model.
IACR Cryptol. ePrint Arch., 2015

2014
Protecting Encrypted Cookies from Compression Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2014

Modelling After-the-fact Leakage for Key Exchange.
IACR Cryptol. ePrint Arch., 2014

Continuous After-the-fact Leakage-Resilient Key Exchange (full version).
IACR Cryptol. ePrint Arch., 2014

Software implementation level countermeasures against the cache timing attack on advanced encryption standard.
CoRR, 2014

Countermeasures against Bernstein's remote cache timing attack.
CoRR, 2014

Continuous After-the-Fact Leakage-Resilient Key Exchange.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014


  Loading...