Harishma Boyapally

Orcid: 0000-0002-2742-0772

According to our database1, Harishma Boyapally authored at least 14 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72 processor with Out-of-Order Execution.
Proceedings of the 19th USENIX WOOT Conference on Offensive Technologies, 2025

2024
Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives.
IACR Cryptol. ePrint Arch., 2024

Reality Check on Side-Channels: Lessons learnt from breaking AES on an ARM Cortex A processor.
IACR Cryptol. ePrint Arch., 2024

2023
PReFeR : Physically Related Function based Remote Attestation Protocol.
ACM Trans. Embed. Comput. Syst., October, 2023

Commitments via Physically Related Functions.
IEEE Trans. Inf. Forensics Secur., 2023

Invited Paper: Oblivious Transfer Protocol without Physical Transfer of Hardware Root-of-Trust.
Proceedings of the 5th workshop on Advanced tools, 2023

2022
Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange.
IEEE Trans. Inf. Forensics Secur., 2022

Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters.
IEEE Trans. Dependable Secur. Comput., 2022

XOR Compositions of Physically Related Functions.
IACR Cryptol. ePrint Arch., 2022

PUF-COTE: A PUF Construction with Challenge Obfuscation and Throughput Enhancement.
IACR Cryptol. ePrint Arch., 2022

2021
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange.
IACR Cryptol. ePrint Arch., 2021

On the Validity of Spoofing Attack Against Safe is the New Smart.
IACR Cryptol. ePrint Arch., 2021

2018
POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2016
Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016


  Loading...