Modelling after-the-fact leakage for key exchange J Alawatugoda, D Stebila, C Boyd Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 57 | 2014 |
Continuous after-the-fact leakage-resilient key exchange J Alawatugoda, C Boyd, D Stebila Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014 | 39 | 2014 |
Continuous after-the-fact leakage-resilient eck-secure key exchange J Alawatugoda, D Stebila, C Boyd Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015 | 32 | 2015 |
A review of the nist lightweight cryptography finalists and their fault analyses H Madushan, I Salam, J Alawatugoda Electronics 11 (24), 4199, 2022 | 18 | 2022 |
Protecting encrypted cookies from compression side-channel attacks J Alawatugoda, D Stebila, C Boyd Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 18 | 2015 |
Countermeasures against Bernstein's remote cache timing attack J Alawatugoda, D Jayasinghe, R Ragel 2011 6th International Conference on Industrial and Information Systems, 43-48, 2011 | 18 | 2011 |
On the leakage-resilient key exchange J Alawatugoda Journal of Mathematical Cryptology 11 (4), 215-269, 2017 | 11 | 2017 |
Software implementation level countermeasures against the cache timing attack on advanced encryption standard U Herath, J Alawatugoda, R Ragel 2013 IEEE 8th International Conference on Industrial and Information Systems …, 2013 | 9 | 2013 |
Generic construction of an eCK-secure key exchange protocol in the standard model J Alawatugoda International Journal of Information Security 16 (5), 541-557, 2017 | 8* | 2017 |
On advances of lattice-based cryptographic schemes and their implementations H Bandara, Y Herath, T Weerasundara, J Alawatugoda Cryptography 6 (4), 56, 2022 | 6 | 2022 |
Bat—block analytics tool integrated with blockchain based iot platform C Edussuriya, K Vithanage, N Bandara, J Alawatugoda, M Sandirigama, ... Electronics 9 (9), 1525, 2020 | 6 | 2020 |
Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting S Chakraborty, J Alawatugoda, C Pandu Rangan Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017 | 6 | 2017 |
A new frontier in streamflow modeling in ungauged basins with sparse data: A modified generative adversarial network with explainable AI U Perera, DTS Coralage, IU Ekanayake, J Alawatugoda, DPP Meddage Results in Engineering, 101920, 2024 | 5 | 2024 |
Unveiling Copy-Move Forgeries: Enhancing Detection With SuperPoint Keypoint Architecture A Diwan, D Kumar, R Mahadeva, HCS Perera, J Alawatugoda IEEE Access, 2023 | 5 | 2023 |
Review on leakage resilient key exchange security models CCZ Wei, CC Wen, J Alawatugoda International Journal of Communication Networks and Information Security 11 …, 2019 | 5* | 2019 |
On power analysis attacks against hardware stream ciphers RD Silva, I Navaratna, M Kumarasiri, J Alawatugoda, CC Wen International Journal of Information and Computer Security 17 (1-2), 21-35, 2022 | 4 | 2022 |
New approach to practical leakage-resilient public-key cryptography S Chakraborty, J Alawatugoda, CP Rangan Journal of Mathematical Cryptology 14 (1), 172-201, 2020 | 4 | 2020 |
Mixed-Reality based Multi-Agent Robotics Framework for Artificial Swarm Intelligence Experiments D Karunarathna, N Jaliyagoda, G Jayalath, J Alawatugoda, R Ragel, ... IEEE Access, 2023 | 3 | 2023 |
Peer-to-peer energy trading through swarm intelligent Stackelberg game C Edussuriya, U Marikkar, S Wickramasinghe, U Jayasinghe, ... Energies 16 (5), 2434, 2023 | 3 | 2023 |
Standard model leakage-resilient authenticated key exchange using inner-product extractors J Alawatugoda, T Okamoto Designs, Codes and Cryptography, 1-21, 2022 | 3 | 2022 |