关注
PRASANNA RAVI
PRASANNA RAVI
Research [email protected] Labs, Graduate [email protected] of Computer Science and Engineering
在 ntu.edu.sg 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs.
P Ravi, SS Roy, A Chattopadhyay, S Bhasin
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020 (3), 307-335, 2020
1162020
Number “Not Used” Once - Practical Fault Attack on pqm4 Implementations of NIST Candidates
P Ravi, DB Roy, S Bhasin, A Chattopadhyay, D Mukhopadhyay
International Workshop on Constructive Side-Channel Analysis and Secure …, 2019
392019
Side-channel Assisted Existential Forgery Attack on Dilithium-A NIST PQC candidate.
P Ravi, MP Jhanwar, J Howe, A Chattopadhyay, S Bhasin
IACR Cryptol. ePrint Arch. 2018, 821, 2018
392018
On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks
P Ravi, S Bhasin, SS Roy, A Chattopadhyay
IEEE Transactions on Information Forensics and Security 17, 684 - 699, 2021
382021
Exploiting determinism in lattice-based signatures: practical fault attacks on pqm4 implementations of NIST candidates
P Ravi, MP Jhanwar, J Howe, A Chattopadhyay, S Bhasin
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
292019
Drop by Drop you break the rock-Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks.
P Ravi, S Bhasin, SS Roy, A Chattopadhyay
IACR Cryptol. ePrint Arch. 2020, 549, 2020
272020
On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT
P Ravi, R Poussier, S Bhasin, A Chattopadhyay
International Conference on Security, Privacy, and Applied Cryptography …, 2020
242020
Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
P Ravi, MF Ezerman, S Bhasin, A Chattopadhyay, SS Roy
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (1), 718, 2021
212021
Improving speed of Dilithium’s signing procedure
P Ravi, SS Gupta, A Chattopadhyay, S Bhasin
Smart Card Research and Advanced Applications: 18th International Conference …, 2020
172020
Ppap and ippap: Pll-based protection against physical attacks
P Ravi, S Bhasin, J Breier, A Chattopadhyay
2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 620-625, 2018
152018
Lattice-based key-sharing schemes: A survey
P Ravi, J Howe, A Chattopadhyay, S Bhasin
ACM Computing Surveys (CSUR) 54 (1), 1-39, 2021
132021
Authentication protocol for secure automotive systems: Benchmarking post-quantum cryptography
P Ravi, VK Sundar, A Chattopadhyay, S Bhasin, A Easwaran
2020 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2020
112020
Feature selection methods for non-profiled side-channel attacks on ecc
P Ravi, B Jungk, D Jap, Z Najm, S Bhasin
2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 1-5, 2018
112018
Security is an architectural design constraint
P Ravi, Z Najm, S Bhasin, M Khairallah, SS Gupta, A Chattopadhyay
Microprocessors and microsystems 68, 17-27, 2019
102019
Pushing the limits of generic side-channel attacks on LWE-based KEMs-parallel PC oracle attacks on Kyber KEM and beyond
G Rajendran, P Ravi, JP D’Anvers, S Bhasin, A Chattopadhyay
IACR Transactions on Cryptographic Hardware and Embedded Systems, 418-446, 2023
82023
Practical multiple persistent faults analysis
H Soleimany, N Bagheri, H Hadipour, P Ravi, S Bhasin, S Mansouri
Cryptology ePrint Archive, 2021
82021
Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results
P Ravi, A Chattopadhyay, JP D’Anvers, A Baksi
ACM Transactions on Embedded Computing Systems, 2022
52022
One word/cycle HC-128 accelerator via state-splitting optimization
A Khalid, P Ravi, A Chattopadhyay, G Paul
Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014
52014
SIPFA: statistical ineffective persistent faults analysis on feistel ciphers
N Bagheri, S Sadeghi, P Ravi, S Bhasin, H Soleimany
IACR Transactions on Cryptographic Hardware and Embedded Systems, 367-390, 2022
42022
On threat of hardware trojan to post-quantum lattice-based schemes: a key recovery attack on saber and beyond
P Ravi, S Deb, A Baksi, A Chattopadhyay, S Bhasin, A Mendelson
International Conference on Security, Privacy, and Applied Cryptography …, 2021
42021
系统目前无法执行此操作,请稍后再试。
文章 1–20