Aikata

Orcid: 0000-0003-0934-2982

According to our database1, Aikata authored at least 17 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
High-Speed Design of Post Quantum Cryptography With Optimized Hashing and Multiplication.
IEEE Trans. Circuits Syst. II Express Briefs, February, 2024

ModHE: Modular Homomorphic Encryption Using Module Lattices Potentials and Limitations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration.
IACR Cryptol. ePrint Arch., 2024

SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault.
IACR Cryptol. ePrint Arch., 2024

REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography.
CoRR, 2024

2023
A Unified Cryptoprocessor for Lattice-Based Signature and Key-Exchange.
IEEE Trans. Computers, June, 2023

KaLi: A Crystal for Post-Quantum Security Using Kyber and Dilithium.
IEEE Trans. Circuits Syst. I Regul. Pap., February, 2023

Medha: Microcoded Hardware Accelerator for computing on Encrypted Data.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Towards High-speed ASIC Implementations of Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2023

REED: Chiplet-Based Scalable Hardware Accelerator for Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

2022
Fault analysis of the PRINCE family of lightweight ciphers.
J. Cryptogr. Eng., 2022

Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs.
IACR Cryptol. ePrint Arch., 2022

KaLi: A Crystal for Post-Quantum Security.
IACR Cryptol. ePrint Arch., 2022

2021
Accelerator for Computing on Encrypted Data.
IACR Cryptol. ePrint Arch., 2021

2020
DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

PRINCE under Differential Fault Attack: Now in 3D.
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020


  Loading...