Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Debapriya Basu Roy"'
Autor:
Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 1 (2021)
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing rese
Externí odkaz:
https://doaj.org/article/3cfe8bdcb938402d9db6c5b9b93e3636
Publikováno v:
IEEE Transactions on Circuits and Systems II
This brief addresses the problem of implementing very large constant multiplications by a single variable under the shift-adds architecture using a minimum number of adders/subtractors. Due to the intrinsic complexity of the problem, we introduce an
Publikováno v:
IEEE Transactions on Computers. 71:506-519
Pairing cryptosystems are powerful mathematical tools for the development of cryptographic protocols that provide end-to-end security for applications like Internet-of-Things (IoT), cloud services and cyber-physical systems (CPS). However, these appl
Autor:
Piyush Beegala, Debapriya Basu Roy, Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay
Publikováno v:
2022 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT).
Autor:
Shivam Bhasin, Debapriya Basu Roy, Avik Chakraborty, Dirmanto Jap, Sayandeep Saha, Debdeep Mukhopadhyay
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:1905-1919
Right from its introduction, fault attacks (FA) have been established to be one of the most practical threats to both public key and symmetric key based cryptosystems. Statistical Ineffective Fault Analysis (SIFA) is a recently proposed class of faul
Publikováno v:
Journal of Electronic Testing. 35:605-619
Power analysis attack is a form of side channel attack which can recover the key of a cryptographic algorithm running on some device. In this work we propose CAD based methodology to perform power analysis on pre-silicon gate-level netlist of cryptog
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 27:1587-1600
Elliptic curve-based cryptography (ECC) has become the automatic choice for public key cryptography due to its lightweightness compared to Rivest–Shamir–Adleman (RSA). The most important operation in ECC is elliptic curve scalar multiplication, a
Publikováno v:
ICCAD
Post-quantum cryptography has emerged as a very attractive research topic due to the recent advancements in the development of quantum computers. Among the different available post-quantum public-key algorithms, Supersingular Isogeny Key-Encapsulatio
Publikováno v:
VLSI-SOC
Koblitz Curves offer excellent optimization opportunities for characteristic-2 Elliptic Curve Cryptosystems (ECC). However, porting such choices onto a lightweight and cost-effective FPGA platform is a major challenge. The underlying characteristic-2
Autor:
Arnab Bag, Manaar Alam, Debdeep Mukhopadhyay, Dirmanto Jap, Jakub Breier, Debapriya Basu Roy, Shivam Bhasin
Fault injection-based cryptanalysis is one of the most powerful practical threats to modern cryptographic primitives. Popular countermeasures to such fault-based attacks generally use some form of redundant computation to detect and react/correct the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::769885a280c50fe7b9adfa5ea6b41292
https://hdl.handle.net/10356/147421
https://hdl.handle.net/10356/147421