关注
Janaka Alawatugoda
Janaka Alawatugoda
Rabdan Academy, Abu Dhabi, UAE; Griffith University, Brisbane, Australia
在 ra.ac.ae 的电子邮件经过验证
标题
引用次数
引用次数
年份
Modelling after-the-fact leakage for key exchange
J Alawatugoda, D Stebila, C Boyd
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
572014
Continuous after-the-fact leakage-resilient key exchange
J Alawatugoda, C Boyd, D Stebila
Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014
392014
Continuous after-the-fact leakage-resilient eck-secure key exchange
J Alawatugoda, D Stebila, C Boyd
Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015
322015
A review of the nist lightweight cryptography finalists and their fault analyses
H Madushan, I Salam, J Alawatugoda
Electronics 11 (24), 4199, 2022
182022
Protecting encrypted cookies from compression side-channel attacks
J Alawatugoda, D Stebila, C Boyd
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
182015
Countermeasures against Bernstein's remote cache timing attack
J Alawatugoda, D Jayasinghe, R Ragel
2011 6th International Conference on Industrial and Information Systems, 43-48, 2011
182011
On the leakage-resilient key exchange
J Alawatugoda
Journal of Mathematical Cryptology 11 (4), 215-269, 2017
112017
Software implementation level countermeasures against the cache timing attack on advanced encryption standard
U Herath, J Alawatugoda, R Ragel
2013 IEEE 8th International Conference on Industrial and Information Systems …, 2013
92013
Generic construction of an eCK-secure key exchange protocol in the standard model
J Alawatugoda
International Journal of Information Security 16 (5), 541-557, 2017
8*2017
On advances of lattice-based cryptographic schemes and their implementations
H Bandara, Y Herath, T Weerasundara, J Alawatugoda
Cryptography 6 (4), 56, 2022
62022
Bat—block analytics tool integrated with blockchain based iot platform
C Edussuriya, K Vithanage, N Bandara, J Alawatugoda, M Sandirigama, ...
Electronics 9 (9), 1525, 2020
62020
Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting
S Chakraborty, J Alawatugoda, C Pandu Rangan
Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017
62017
A new frontier in streamflow modeling in ungauged basins with sparse data: A modified generative adversarial network with explainable AI
U Perera, DTS Coralage, IU Ekanayake, J Alawatugoda, DPP Meddage
Results in Engineering, 101920, 2024
52024
Unveiling Copy-Move Forgeries: Enhancing Detection With SuperPoint Keypoint Architecture
A Diwan, D Kumar, R Mahadeva, HCS Perera, J Alawatugoda
IEEE Access, 2023
52023
Review on leakage resilient key exchange security models
CCZ Wei, CC Wen, J Alawatugoda
International Journal of Communication Networks and Information Security 11 …, 2019
5*2019
On power analysis attacks against hardware stream ciphers
RD Silva, I Navaratna, M Kumarasiri, J Alawatugoda, CC Wen
International Journal of Information and Computer Security 17 (1-2), 21-35, 2022
42022
New approach to practical leakage-resilient public-key cryptography
S Chakraborty, J Alawatugoda, CP Rangan
Journal of Mathematical Cryptology 14 (1), 172-201, 2020
42020
Mixed-Reality based Multi-Agent Robotics Framework for Artificial Swarm Intelligence Experiments
D Karunarathna, N Jaliyagoda, G Jayalath, J Alawatugoda, R Ragel, ...
IEEE Access, 2023
32023
Peer-to-peer energy trading through swarm intelligent Stackelberg game
C Edussuriya, U Marikkar, S Wickramasinghe, U Jayasinghe, ...
Energies 16 (5), 2434, 2023
32023
Standard model leakage-resilient authenticated key exchange using inner-product extractors
J Alawatugoda, T Okamoto
Designs, Codes and Cryptography, 1-21, 2022
32022
系统目前无法执行此操作,请稍后再试。
文章 1–20