Srinivas Vivek
Titel
Zitiert von
Zitiert von
Jahr
Leakage-resilient authentication and encryption from symmetric cryptographic primitives
O Pereira, FX Standaert, S Vivek
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
602015
Fixed-point arithmetic in SHE schemes
A Costache, NP Smart, S Vivek, A Waller
International Conference on Selected Areas in Cryptography, 401-422, 2016
592016
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
A Roy, S Vivek
Cryptographic Hardware and Embedded Systems - CHES 2013, 417-434, 2013
412013
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures
JS Coron, A Roy, S Vivek
Journal of Cryptographic Engineering 5 (2), 73-83, 2015
362015
A practical leakage-resilient signature scheme in the generic group model
D Galindo, S Vivek
International Conference on Selected Areas in Cryptography, 50-65, 2012
272012
Implementation of a leakage-resilient ElGamal key encapsulation mechanism
D Galindo, J Großschädl, Z Liu, PK Vadnala, S Vivek
Journal of Cryptographic Engineering 6 (3), 229-238, 2016
19*2016
Image Classification using non-linear Support Vector Machines on Encrypted Data.
A Barnett, J Santokhi, M Simpson, NP Smart, C Stainton-Bygrave, S Vivek, ...
IACR Cryptol. ePrint Arch. 2017, 857, 2017
162017
Faster secure multi-party computation of AES and DES using lookup tables
M Keller, E Orsini, D Rotaru, P Scholl, E Soria-Vazquez, S Vivek
International Conference on Applied Cryptography and Network Security, 229-249, 2017
152017
Faster Homomorphic Evaluation of Discrete Fourier Transforms
A Costache, NP Smart, S Vivek
132016
Integer Complexity: Breaking the θ(n2) barrier
V Srinivas Vivek, BR Shankar
http://hdl.handle.net/10993/18508, 2008
132008
A leakage-resilient pairing-based variant of the Schnorr signature scheme
D Galindo, S Vivek
IMA International Conference on Cryptography and Coding, 173-192, 2013
72013
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
D Goudarzi, M Rivain, D Vergnaud, S Vivek
International Conference on Cryptographic Hardware and Embedded Systems, 154-171, 2017
62017
Reducing the number of non-linear multiplications in masking schemes
J Pulkus, S Vivek
International Conference on Cryptographic Hardware and Embedded Systems, 479-497, 2016
52016
Limits of a conjecture on a leakage-resilient cryptosystem
D Galindo, S Vivek
Information Processing Letters 114 (4), 192-196, 2014
52014
Processing Encrypted Data Using Homomorphic Encryption
A Barnett, C Bonte, C Bootland, JW Bos, W Castryck, A Costache, ...
Workshop on Data Mining with Secure Computation, SODA project, 2017
22017
Revisiting a Masked Lookup-Table Compression Scheme
S Vivek
International Conference on Cryptology in India, 369-383, 2017
12017
Practical provable security against side-channel attacks
SV Venkatesh
University of Luxembourg, Luxembourg, 2015
12015
Cubic Sieve Congruence of the Discrete Logarithm Problem, and fractional part sequences
S Vivek, CEV Madhavan
Journal of Symbolic Computation 64, 22-34, 2014
12014
On A Cubic Sieve Congruence Related To The Discrete Logarithm Problem
SV Vivek
12013
Second-Order Masked Lookup Table Compression Scheme
A Valiveti, S Vivek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 129-153, 2020
2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20