Nimish Mishra

Orcid: 0000-0002-8585-9425

According to our database1, Nimish Mishra authored at least 17 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A survey on security and cryptographic perspective of Industrial-Internet-of-Things.
Internet Things, April, 2024

Quantum-Assisted Activation for Supervised Learning in Healthcare-Based Intrusion Detection Systems.
IEEE Trans. Artif. Intell., March, 2024

Blockchain-Based User Authentication and Data-Sharing Framework for Healthcare Industries.
IEEE Trans. Netw. Sci. Eng., 2024

CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2024

"There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting.
IACR Cryptol. ePrint Arch., 2024

Shesha : Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors.
Proceedings of the 33rd USENIX Security Symposium, 2024

Faults in Our Bus: Novel Bus Fault Attack to Break ARM TrustZone.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel Processors.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

2023
SEC: Fast Private Boolean Circuit Evaluation from Encrypted Look-ups.
IACR Cryptol. ePrint Arch., 2023

Modelling Delay-based Physically Unclonable Functions through Particle Swarm Optimization.
IACR Cryptol. ePrint Arch., 2023

Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks.
IACR Cryptol. ePrint Arch., 2023

On the Amplification of Cache Occupancy Attacks in Randomized Cache Architectures.
CoRR, 2023

BCTPV-NIZK: Publicly-Verifiable Non-interactive Zero-Knowledge Proof System from Minimal Blockchain Assumptions.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2022
Time's a Thief of Memory - Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
A comprehensive review on collision-resistant hash functions on lattices.
J. Inf. Secur. Appl., 2021

2020
Automation of quantum Braitenberg vehicles using finite automata: Moore machines.
Quantum Inf. Process., 2020


  Loading...