Pqc acceleration using gpus: Frodokem, newhope, and kyber N Gupta, A Jati, AK Chauhan, A Chattopadhyay IEEE Transactions on Parallel and Distributed Systems 32 (3), 575-586, 2020 | 62 | 2020 |
Lightweight hardware accelerator for post-quantum digital signature crystals-dilithium N Gupta, A Jati, A Chattopadhyay, G Jha IEEE Transactions on Circuits and Systems I: Regular Papers 70 (8), 3234-3243, 2023 | 31 | 2023 |
Threshold Implementations of : A Trade-Off Analysis A Jati, N Gupta, A Chattopadhyay, SK Sanadhya, D Chang IEEE Transactions on Information Forensics and Security 15, 2110-2120, 2019 | 31 | 2019 |
A configurable CRYSTALS-Kyber hardware implementation with side-channel protection A Jati, N Gupta, A Chattopadhyay, SK Sanadhya ACM Transactions on Embedded Computing Systems 23 (2), 1-25, 2024 | 27 | 2024 |
Threshold implementations of GIFT: A trade-off analysis N Gupta, A Jati, SK Sanadhya, A Chattopadhyay, D Chang | 20 | 2021 |
Rig: A Simple, Secure and Flexible Design for Password Hashing D Chang, A Jati, S Mishra, SK Sanadhya Information Security and Cryptology: 10th International Conference, Inscrypt …, 2015 | 20 | 2015 |
SPQCop: Side-channel protected post-quantum cryptoprocessor A Jati, N Gupta, A Chattopadhyay, SK Sanadhya Cryptology ePrint Archive, 2019 | 14 | 2019 |
MemEnc: A lightweight, low-power, and transparent memory encryption engine for IoT N Gupta, A Jati, A Chattopadhyay IEEE Internet of Things Journal 8 (9), 7182-7191, 2020 | 11 | 2020 |
Cryptanalytic time–memory trade-off for password hashing schemes D Chang, A Jati, S Mishra, SK Sanadhya International Journal of Information Security 18 (2), 163-180, 2019 | 11 | 2019 |
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms D Chang, M Ghosh, KC Gupta, A Jati, A Kumar, D Moon, IG Ray, ... Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017 | 11 | 2017 |
Ascon-sign V Srivastava, N Gupta, A Jati, A Baksi, J Breier, A Chattopadhyay, ... NIST PQC Additional Round 1, 2023 | 4 | 2023 |
Baksheesh: similar yet different from gift A Baksi, J Breier, A Chattopadhyay, T Gerlich, S Guilley, N Gupta, T Isobe, ... Cryptology ePrint Archive, 2023 | 4 | 2023 |
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices D Chang, M Ghosh, A Jati, A Kumar, SK Sanadhya Security, Privacy, and Applied Cryptography Engineering: 7th International …, 2017 | 4 | 2017 |
Ai attacks ai: Recovering neural network architecture from nvdla using ai-assisted side channel attack N Gupta, A Jati, A Chattopadhyay Cryptology ePrint Archive, 2023 | 3 | 2023 |
Exploiting the leakage: analysis of some authenticated encryption schemes D Chang, AK Chauhan, N Gupta, A Jati, SK Sanadhya International Conference on Security, Privacy, and Applied Cryptography …, 2016 | 2 | 2016 |
Cryptographic module based approach for password hashing schemes D Chang, A Jati, S Mishra, SK Sanadhya Technology and Practice of Passwords: International Conference on Passwords …, 2015 | 2 | 2015 |
CRYSTALS-Dilithium on RISC-V Processor: Lightweight Secure Boot Using Post-Quantum Digital Signature N Gupta, A Jati, A Chattopadhyay 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), 1-7, 2023 | 1 | 2023 |
Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software P Ravi, A Jati, S Bhasin Cryptology ePrint Archive, 2023 | 1 | 2023 |
A generalized format preserving encryption framework using MDS matrices D Chang, M Ghosh, A Jati, A Kumar, SK Sanadhya Journal of Hardware and Systems Security 3, 3-11, 2019 | 1 | 2019 |
Performance analysis of some password hashing schemes D Chang, A Jati, S Mishra, SK Sanadhya Cryptology ePrint Archive, 2015 | 1 | 2015 |