Pqc acceleration using gpus: Frodokem, newhope, and kyber N Gupta, A Jati, AK Chauhan, A Chattopadhyay
IEEE Transactions on Parallel and Distributed Systems 32 (3), 575-586, 2020
51 2020 Threshold Implementations of : A Trade-Off Analysis A Jati, N Gupta, A Chattopadhyay, SK Sanadhya, D Chang
IEEE Transactions on Information Forensics and Security 15, 2110-2120, 2019
28 2019 Lightweight hardware accelerator for post-quantum digital signature CRYSTALS-Dilithium N Gupta, A Jati, A Chattopadhyay, G Jha
IEEE Transactions on Circuits and Systems I: Regular Papers, 2023
24 2023 Threshold implementations of GIFT: A trade-off analysis N Gupta, A Jati, SK Sanadhya, A Chattopadhyay, D Chang
20 2021 A configurable crystals-kyber hardware implementation with side-channel protection A Jati, N Gupta, A Chattopadhyay, SK Sanadhya
ACM Transactions on Embedded Computing Systems 23 (2), 1-25, 2024
18 2024 Rig: A Simple, Secure and Flexible Design for Password HashingD Chang, A Jati, S Mishra, SK Sanadhya
Information Security and Cryptology: 10th International Conference, Inscrypt …, 2015
18 2015 SPQCop: Side-channel protected post-quantum cryptoprocessor A Jati, N Gupta, A Chattopadhyay, SK Sanadhya
Cryptology ePrint Archive, 2019
14 2019 MemEnc: A lightweight, low-power, and transparent memory encryption engine for IoT N Gupta, A Jati, A Chattopadhyay
IEEE Internet of Things Journal 8 (9), 7182-7191, 2020
10 2020 Cryptanalytic time–memory trade-off for password hashing schemes D Chang, A Jati, S Mishra, SK Sanadhya
International Journal of Information Security 18 (2), 163-180, 2019
10 2019 SPF : A New Family of Efficient Format-Preserving Encryption AlgorithmsD Chang, M Ghosh, KC Gupta, A Jati, A Kumar, D Moon, IG Ray, ...
Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017
10 2017 eSPF : A Family of Format-Preserving Encryption Algorithms Using MDS MatricesD Chang, M Ghosh, A Jati, A Kumar, SK Sanadhya
Security, Privacy, and Applied Cryptography Engineering: 7th International …, 2017
4 2017 Ascon-sign V Srivastava, N Gupta, A Jati, A Baksi, J Breier, A Chattopadhyay, ...
NIST PQC Additional Round 1, 2023
3 2023 Ai attacks ai: Recovering neural network architecture from nvdla using ai-assisted side channel attack N Gupta, A Jati, A Chattopadhyay
Cryptology ePrint Archive, 2023
3 2023 Exploiting the leakage: analysis of some authenticated encryption schemes D Chang, AK Chauhan, N Gupta, A Jati, SK Sanadhya
International Conference on Security, Privacy, and Applied Cryptography …, 2016
3 2016 Baksheesh: Similar yet different from gift A Baksi, J Breier, A Chattopadhyay, T Gerlich, S Guilley, N Gupta, T Isobe, ...
Cryptology ePrint Archive, 2023
2 2023 Cryptographic module based approach for password hashing schemes D Chang, A Jati, S Mishra, SK Sanadhya
Technology and Practice of Passwords: International Conference on Passwords …, 2015
2 2015 A generalized format preserving encryption framework using MDS matrices D Chang, M Ghosh, A Jati, A Kumar, SK Sanadhya
Journal of Hardware and Systems Security 3, 3-11, 2019
1 2019 Performance analysis of some password hashing schemes D Chang, A Jati, S Mishra, SK Sanadhya
Cryptology ePrint Archive, 2015
1 2015 EFFLUX-F2: A High Performance Hardware Security Evaluation Board A Jati, N Gupta, A Chattopadhyay, SK Sanadhya
International Workshop on Constructive Side-Channel Analysis and Secure …, 2024
2024 CRYSTALS-Dilithium on RISC-V Processor: Lightweight Secure Boot Using Post-Quantum Digital Signature N Gupta, A Jati, A Chattopadhyay
2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), 1-7, 2023
2023