Kali: A Crystal for Post-Quantum Security Using Kyber and Dilithium A Aikata, AC Mert, M Imran, S Pagliarini, SS Roy IEEE Transactions on Circuits and Systems I: Regular Papers, 2022 | 54 | 2022 |
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data AC Mert, Aikata, S Kwon, Y Shin, D Yoo, Y Lee, SS Roy Cryptology ePrint Archive, 2022 | 36* | 2022 |
A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange A Aikata, AC Mert, D Jacquemin, A Das, D Matthews, S Ghosh, SS Roy IEEE Transactions on Computers, 2022 | 26 | 2022 |
High-speed design of post quantum cryptography with optimized hashing and multiplication M Imran, A Aikata, SS Roy, S Pagliarini IEEE Transactions on Circuits and Systems II: Express Briefs 71 (2), 847-851, 2023 | 12 | 2023 |
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography A Aikata, A Basso, G Cassiers, AC Mert, SS Roy IACR Transactions on Cryptographic Hardware and Embedded Systems, 366-390, 2023 | 9 | 2023 |
REED: Chiplet-based accelerator for fully homomorphic encryption A Aikata, AC Mert, S Kwon, M Deryabin, SS Roy Cryptology ePrint Archive, 2023 | 7 | 2023 |
Backdooring post-quantum cryptography: Kleptographic attacks on lattice-based KEMs P Ravi, S Bhasin, A Chattopadhyay, A Aikata, S Sinha Roy Proceedings of the Great Lakes Symposium on VLSI 2024, 216-221, 2024 | 4 | 2024 |
PRINCE under Differential Fault Attack: Now in 3D A Aikata, B Karmakar, D Saha Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware …, 2020 | 3 | 2020 |
ModHE: Modular Homomorphic Encryption Using Module Lattices: Potentials and Limitations A Mukherjee, A Aikata, AC Mert, Y Lee, S Kwon, M Deryabin, SS Roy Cryptology ePrint Archive, 2023 | 2 | 2023 |
DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault Aikata, B Karmakar, D Saha 2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020 | 2 | 2020 |
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration A Kim, AC Mert, A Mukherjee, A Aikata, M Deryabin, S Kwon, HC Kang, ... Annual International Cryptology Conference, 76-106, 2024 | 1 | 2024 |
SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault A Aikata, A Dabholkar, D Saha, SS Roy Cryptology ePrint Archive, 2024 | 1 | 2024 |
Towards high-speed asic implementations of post-quantum cryptography M Imran, A Aikata, SS Roy Cryptology ePrint Archive, 2023 | 1 | 2023 |
Fault analysis of the PRINCE family of lightweight ciphers AK Kundu, Aikata, B Karmakar, D Saha Journal of Cryptographic Engineering, 1-20, 2022 | 1 | 2022 |
REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography S Pagliarini, A Aikata, M Imran, S Sinha Roy Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | | 2024 |
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials AK Kundu, S Ghosh, A Aikata, D Saha Cryptology ePrint Archive, 2024 | | 2024 |
PASTA on Edge: Cryptoprocessor for Hybrid Homomorphic Encryption A Aikata, DS Sobrino, SS Roy Cryptology ePrint Archive, 2024 | | 2024 |
Secure and Efficient Outsourced Matrix Multiplication with Homomorphic Encryption A Aikata, SS Roy Cryptology ePrint Archive, 2024 | | 2024 |
Crypto processor and electronic device including the same DY Sujoy Sinha Roy, Ahmet Can Mert, Aikata, Sunmin KWON, Youngsam Shin US Patent US20230132500A1, 2023 | | 2023 |