{FastKitten}: Practical smart contracts on bitcoin P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ... 28th USENIX Security Symposium (USENIX Security 19), 801-818, 2019 | 114 | 2019 |
A formal treatment of deterministic wallets P Das, S Faust, J Loss Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 43 | 2019 |
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p) DB Roy, P Das, D Mukhopadhyay International Conference on Selected Areas in Cryptography, 161-177, 2015 | 32 | 2015 |
Deterministic wallets in a quantum world N Alkeilani Alkadri, P Das, A Erwig, S Faust, J Krämer, S Riahi, P Struck Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 19 | 2020 |
The exact security of BIP32 wallets P Das, A Erwig, S Faust, J Loss, S Riahi Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 18 | 2021 |
DPaSE: Distributed password-authenticated symmetric encryption P Das, J Hesse, A Lehmann Cryptology ePrint Archive, 2020 | 7 | 2020 |
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance P Das, DB Roy, D Mukhopadhyay https://eprint.iacr.org/2015/925, 2015 | 7 | 2015 |
DPaSE: distributed password-authenticated symmetric-key encryption, or how to get many keys from one password P Das, J Hesse, A Lehmann Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 6 | 2022 |
Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves P Das, DB Roy, H Boyapally, D Mukhopadhyay 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016 | 4 | 2016 |
Secure public key hardware for IoT applications P Das, DB Roy, D Mukhopadhyay 2016 IEEE 59th International Midwest Symposium on Circuits and Systems …, 2016 | 4 | 2016 |
Round efficient byzantine agreement from VDFs P Das, L Eckey, S Faust, J Loss, M Maitra Cryptology ePrint Archive, 2022 | 3 | 2022 |
Bip32-compatible threshold wallets P Das, A Erwig, S Faust, J Loss, S Riahi Cryptology ePrint Archive, 2023 | 2 | 2023 |
Improved atomicity to prevent HCCA on NIST curves P Das, D Basu Roy, D Mukhopadhyay Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016 | 1 | 2016 |
Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies P Das, A Erwig, M Meyer, P Struck Cryptology ePrint Archive, 2023 | | 2023 |
Secure Infrastructures in the Realm of Decentralization P Das Technische Universität Darmstadt, 2023 | | 2023 |
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands P Das, DB Roy, D Mukhopadhyay Journal of Cryptographic Engineering 9, 263-275, 2019 | | 2019 |
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands P Das, DB Roy, D Mukhopadhyay EPiC Series in Computing 49, 33-49, 2017 | | 2017 |