Bernard L. Menezes

Orcid: 0000-0003-2997-9286

Affiliations:
  • Indian Institute of Technology, Bombay, India


According to our database1, Bernard L. Menezes authored at least 37 papers between 1985 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Secure Computation over Encrypted Databases.
CoRR, 2023

2021
On Disabling Prefetcher to Amplify Cache Side Channels.
Proceedings of the 25th International Symposium on VLSI Design and Test, 2021

2020
"S-Box" Implementation of AES Is Not Side Channel Resistant.
J. Hardw. Syst. Secur., 2020

2019
A new Hybrid Lattice Attack on Galbraith's Binary LWE Cryptosystem.
CoRR, 2019

Plaintext Recovery Attacks and Their Mitigation in an Application-Specific SHE Scheme.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

Cryptanalysis of Homomorphic Encryption Schemes based on the Aproximate GCD Problem.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Learning Plaintext in Galbraith's LWE Cryptosystem.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks.
IACR Cryptol. ePrint Arch., 2017

DSA Signing Key Recovery with Noisy Side Channels and Variable Error Rates.
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017

Malicious Application Detection on Android Smartphones with Enhanced Static-Dynamic Analysis.
Proceedings of the Information Systems Security - 13th International Conference, 2017

2016
Two for the price of one: A combined browser defense against XSS and clickjacking.
Proceedings of the 2016 International Conference on Computing, 2016

Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2015
Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES.
Proceedings of the SECRYPT 2015, 2015

2014
Challenges in Implementing Cache-Based Side Channel Attacks on Modern Processors.
Proceedings of the 2014 27th International Conference on VLSI Design, 2014

Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization.
Proceedings of the SECRYPT 2014, 2014

2012
A Clustering Based Forecast Engine for Retail Sales.
J. Digit. Inf. Manag., 2012

Implementing side-channel attacks on suggest boxes in web applications.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2010
Intrusion Detection Using Graph Support: A Hybrid Approach of Supervised and Unsupervised Techniques.
Int. J. Adv. Comp. Techn., 2010

Intelligent sales forecasting engine using genetic algorithms.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Dynamic Policy Based Model for Trust Based Access Control in P2P Applications.
Proceedings of IEEE International Conference on Communications, 2009

2008
Forecasting Using Consistent Experts.
Proceedings of the 14th International Conference on Management of Data, 2008

2007
ArchKriti : A Software Architecture Based Design and Evaluation Tool Suite.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2006
Transformation of UML Design Model into Performance Model - A Model-Driven Framework.
Proceedings of the ICEIS 2006, 2006

2005
Forecasting using Decomposition and Combinations of Experts.
Proceedings of the 2005 International Conference on Artificial Intelligence, 2005

Database Access Design for E-Business - A Case Study.
Proceedings of the Advances in Data Management 2005, 2005

1995
New Bounds on the Reliability of Augmented Shuffle-Exchange Networks.
IEEE Trans. Computers, 1995

The Performance of Crossbar-Based Binary Hypercubes.
IEEE Trans. Computers, 1995

1994
Evaluation of Task Allocation in Mesh-Based Multicomputers using Genetic, Neural, and Traditional Algorithms.
Int. J. Artif. Intell. Tools, 1994

1993
Analysis of Pipelined External Sorting on a Reconfigurable Message-Passing Multicomputer.
Parallel Comput., 1993

1991
The KYKLOS Multicomputer Network: Interconnection Strategies, Properties, and Applications.
IEEE Trans. Computers, 1991

New Bounds on the Reliability of Two Augmented Shuffle-Exchange Networks.
Proceedings of the International Conference on Parallel Processing, 1991

1990
Reliability Analysis of Two Classes of Double-Tree Network-Based Multiprocessors.
Proceedings of the 1990 International Conference on Parallel Processing, 1990

1987
Design of a HyperKYKLOS-based Multiprocessor Architecture for High-Performance Join Operations.
Proceedings of the Database Machines and Knowledge Base Machines, 1987

An Interconnection Network Supporting Relational Join Operations.
Proceedings of the 7th International Conference on Distributed Computing Systems, 1987

1986
Reliability Analysis of the KYKLOS Interconnection Network.
Proceedings of the 6th International Conference on Distributed Computing Systems, 1986

KYKLOS: Low Tide High Flow.
Proceedings of the 6th International Conference on Distributed Computing Systems, 1986

1985
KYKLOS : A Linear Growth Fault-Tolerant Interconnection Network.
Proceedings of the International Conference on Parallel Processing, 1985


  Loading...