Follow
Srinivas Vivek
Title
Cited by
Cited by
Year
Leakage-resilient authentication and encryption from symmetric cryptographic primitives
O Pereira, FX Standaert, S Vivek
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
992015
Fixed-point arithmetic in SHE schemes
A Costache, NP Smart, S Vivek, A Waller
Selected Areas in Cryptography–SAC 2016: 23rd International Conference, St …, 2017
812017
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures
JS Coron, A Roy, S Vivek
Journal of Cryptographic Engineering 5, 73-83, 2015
582015
Faster secure multi-party computation of AES and DES using lookup tables
M Keller, E Orsini, D Rotaru, P Scholl, E Soria-Vazquez, S Vivek
International Conference on Applied Cryptography and Network Security, 229-249, 2017
522017
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
A Roy, S Vivek
Cryptographic Hardware and Embedded Systems - CHES 2013, 417-434, 2013
522013
A practical leakage-resilient signature scheme in the generic group model
D Galindo, S Vivek
International Conference on Selected Areas in Cryptography, 50-65, 2012
512012
Implementation of a leakage-resilient ElGamal key encapsulation mechanism
D Galindo, J Großschädl, Z Liu, PK Vadnala, S Vivek
Journal of Cryptographic Engineering 6, 229-238, 2016
35*2016
Image classification using non-linear support vector machines on encrypted data
A Barnett, J Santokhi, M Simpson, NP Smart, C Stainton-Bygrave, S Vivek, ...
Cryptology ePrint Archive, 2017
252017
Faster Homomorphic Evaluation of Discrete Fourier Transforms
A Costache, NP Smart, S Vivek
212016
Integer Complexity: Breaking the θ(n2) barrier
V Srinivas Vivek, BR Shankar
http://hdl.handle.net/10993/18508, 2008
132008
Generalized polynomial decomposition for s-boxes with application to side-channel countermeasures
D Goudarzi, M Rivain, D Vergnaud, S Vivek
International Conference on Cryptographic Hardware and Embedded Systems, 154-171, 2017
92017
Revisiting driver anonymity in ORide
D Kumaraswamy, S Murthy, S Vivek
International Conference on Selected Areas in Cryptography, 25-46, 2021
82021
Cryptanalysis of the privacy-preserving ride-hailing service TRACE
D Kumaraswamy, S Vivek
Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021
82021
A leakage-resilient pairing-based variant of the Schnorr signature scheme
D Galindo, S Vivek
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
82013
Reducing the number of non-linear multiplications in masking schemes
J Pulkus, S Vivek
International Conference on Cryptographic Hardware and Embedded Systems, 479-497, 2016
72016
Attacks on a privacy-preserving publish-subscribe system and a ride-hailing service
S Vivek
IMA International Conference on Cryptography and Coding, 59-71, 2021
52021
Second-order masked lookup table compression scheme
A Valiveti, S Vivek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 129-153, 2020
52020
Cryptanalysis of a protocol for efficient sorting on SHE encrypted data
S Murthy, S Vivek
IMA International Conference on Cryptography and Coding, 278-294, 2019
52019
Limits of a conjecture on a leakage-resilient cryptosystem
D Galindo, S Vivek
Information Processing Letters 114 (4), 192-196, 2014
52014
An analytic attack against ARX addition exploiting standard side-channel leakage
Y Yan, E Oswald, S Vivek
Cryptology ePrint Archive, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20