Angshuman Karmakar

Orcid: 0000-0003-2594-588X

According to our database1, Angshuman Karmakar authored at least 52 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Full Key Extraction of SNOW-V Using ML-Assisted Power SCA.
IEEE Des. Test, April, 2025

Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms.
ACM Trans. Embed. Comput. Syst., January, 2025

QuripfeNet: Quantum-Resistant IPFE-Based Neural Network.
IEEE Trans. Emerg. Top. Comput., 2025

A Survey on Transciphering and Symmetric Ciphers for Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2025

Fault to Forge: Fault Assisted Forging Attacks on LESS Signature Scheme.
IACR Cryptol. ePrint Arch., 2025

Revisiting Lattice-based Non-interactive Blind Signature.
IACR Cryptol. ePrint Arch., 2025

Using Learning with Rounding to Instantiate Post-Quantum Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2025

Lattice-Based zk-SNARKs with Hybrid Verification Technique.
IACR Cryptol. ePrint Arch., 2025

SCRUBD: Smart Contracts Reentrancy and Unhandled Exceptions Vulnerability Dataset.
Proceedings of the 22nd IEEE/ACM International Conference on Mining Software Repositories, 2025

Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate-and Code-Based PQC.
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025

2024
Efficient TMVP-Based Polynomial Convolution on GPU for Post-Quantum Cryptography Targeting IoT Applications.
IEEE Internet Things J., July, 2024

Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication.
ACM Trans. Embed. Comput. Syst., March, 2024

cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption.
IEEE Trans. Emerg. Top. Comput., 2024

A Fast RLWE-Based IPFE Library and its Application to Privacy-Preserving Biometric Authentication.
IEEE Trans. Emerg. Top. Comput., 2024

LightCROSS: A Secure and Memory Optimized Post-Quantum Digital Signature CROSS.
IACR Cryptol. ePrint Arch., 2024

mUOV: Masking the Unbalanced Oil and Vinegar Digital Sigital Signature Scheme at First- and Higher-Order.
IACR Cryptol. ePrint Arch., 2024

Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism.
IACR Cryptol. ePrint Arch., 2024

cuTraNTT: A Novel Transposed Number Theoretic Transform Targeting Low Latency Homomorphic Encryption for IoT Applications.
IACR Cryptol. ePrint Arch., 2024

SNOW-SCA: ML-Assisted Side-Channel Attack on SNOW-V.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

ZKFault: Fault Attack Analysis on Zero-Knowledge Based Post-quantum Digital Signature Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
A 334 μW 0.158 mm<sup>2</sup> ASIC for Post-Quantum Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom-Cook Multiplication.
IEEE J. Solid State Circuits, 2023

High Throughput Acceleration of Scabbard Key Exchange and Key Encapsulation Mechanism Using Tensor Core on GPU for IoT Applications.
IEEE Internet Things J., 2023

Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM.
IACR Cryptol. ePrint Arch., 2023

TMVP-based Polynomial Convolution for Saber and Sable on GPU using CUDA-cores and Tensor-cores.
IACR Cryptol. ePrint Arch., 2023

A 334µW 0.158mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber with Low-latency Striding Toom-Cook Multiplication Extended Version.
IACR Cryptol. ePrint Arch., 2023

A 334μW 0.158mm<sup>2</sup> ASIC for Post-Quantum Key-Encapsulation Mechanism Saber with Low-latency Striding Toom-Cook Multiplication Authors Version.
CoRR, 2023

On the Masking-Friendly Designs for Post-quantum Cryptography.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

VDOO: A Short, Fast, Post-quantum Multivariate Digital Signature Scheme.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

2022
DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022

Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication.
IACR Cryptol. ePrint Arch., 2022

Area-time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications.
IACR Cryptol. ePrint Arch., 2022

A 334uW 0.158mm<sup>2</sup> Saber Learning with Rounding based Post-Quantum Crypto Accelerator.
CoRR, 2022

Higher-Order Masked Saber.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Efficient Lattice-Based Inner-Product Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

A 334uW 0.158mm2 Saber Learning with Rounding based Post-Quantum Crypto Accelerator.
Proceedings of the IEEE Custom Integrated Circuits Conference, 2022

2021
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms.
IACR Cryptol. ePrint Arch., 2021

DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs.
IACR Cryptol. ePrint Arch., 2021

Polynomial multiplication on embedded vector architectures.
IACR Cryptol. ePrint Arch., 2021

2020
Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism.
IACR Cryptol. ePrint Arch., 2020

Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography.
IACR Cryptol. ePrint Arch., 2020

Optimized Software Implementations for theLightweight Encryption Scheme ForkAE.
IACR Cryptol. ePrint Arch., 2020

A Side-Channel Resistant Implementation of SABER.
IACR Cryptol. ePrint Arch., 2020

Compact domain-specific co-processor for accelerating module lattice-based KEM.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

Optimized Software Implementations for the Lightweight Encryption Scheme ForkAE.
Proceedings of the Smart Card Research and Advanced Applications, 2020

2019
Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.
IACR Cryptol. ePrint Arch., 2019

Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on the Falcon signature scheme.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
Constant-Time Discrete Gaussian Sampling.
IEEE Trans. Computers, 2018

Saber on ARM CCA-secure module lattice-based key encapsulation on ARM.
IACR Cryptol. ePrint Arch., 2018

Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2016
Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography.
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016

Ring-LWE: Applications to Cryptography and Their Efficient Realization.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016


  Loading...