Folgen
Srinivas Vivek
Srinivas Vivek
Bestätigte E-Mail-Adresse bei iiitb.ac.in - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Leakage-resilient authentication and encryption from symmetric cryptographic primitives
O Pereira, FX Standaert, S Vivek
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
782015
Fixed-point arithmetic in SHE schemes
A Costache, NP Smart, S Vivek, A Waller
Selected Areas in Cryptography–SAC 2016: 23rd International Conference, St …, 2017
652017
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures
JS Coron, A Roy, S Vivek
Journal of Cryptographic Engineering 5, 73-83, 2015
532015
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
A Roy, S Vivek
Cryptographic Hardware and Embedded Systems - CHES 2013, 417-434, 2013
522013
A Practical Leakage-Resilient Signature Scheme in the Generic Group Model.
D Galindo, S Vivek
Selected Areas in Cryptography, 50-65, 2012
432012
Faster secure multi-party computation of AES and DES using lookup tables
M Keller, E Orsini, D Rotaru, P Scholl, E Soria-Vazquez, S Vivek
Applied Cryptography and Network Security: 15th International Conference …, 2017
342017
Implementation of a leakage-resilient ElGamal key encapsulation mechanism
D Galindo, J Großschädl, Z Liu, PK Vadnala, S Vivek
Journal of Cryptographic Engineering 6, 229-238, 2016
31*2016
Image classification using non-linear support vector machines on encrypted data
A Barnett, J Santokhi, M Simpson, NP Smart, C Stainton-Bygrave, S Vivek, ...
Cryptology ePrint Archive, 2017
242017
Faster Homomorphic Evaluation of Discrete Fourier Transforms
A Costache, NP Smart, S Vivek
182016
Integer Complexity: Breaking the θ(n2) barrier
V Srinivas Vivek, BR Shankar
http://hdl.handle.net/10993/18508, 2008
132008
Generalized polynomial decomposition for s-boxes with application to side-channel countermeasures
D Goudarzi, M Rivain, D Vergnaud, S Vivek
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
92017
A leakage-resilient pairing-based variant of the Schnorr signature scheme
D Galindo, S Vivek
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
82013
Reducing the number of non-linear multiplications in masking schemes
J Pulkus, S Vivek
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
72016
Revisiting driver anonymity in ORide
D Kumaraswamy, S Murthy, S Vivek
Selected Areas in Cryptography: 28th International Conference, Virtual Event …, 2022
52022
Cryptanalysis of a protocol for efficient sorting on SHE encrypted data
S Murthy, S Vivek
Cryptography and Coding: 17th IMA International Conference, IMACC 2019 …, 2019
52019
Limits of a conjecture on a leakage-resilient cryptosystem
D Galindo, S Vivek
Information Processing Letters 114 (4), 192-196, 2014
52014
Cryptanalysis of the privacy-preserving ride-hailing service TRACE
D Kumaraswamy, S Vivek
Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021
32021
Second-order masked lookup table compression scheme
A Valiveti, S Vivek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 129-153, 2020
32020
Attacks on a privacy-preserving publish-subscribe system and a ride-hailing service
S Vivek
Cryptography and Coding: 18th IMA International Conference, IMACC 2021 …, 2021
22021
Comments on" A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server"
S Vivek
arXiv preprint arXiv:2112.06449, 2021
22021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20