Janaka Alawatugoda

Orcid: 0000-0001-9431-5836

Affiliations:
  • University of Peradeniya, Sri Lanka
  • Griffith University, Australia


According to our database1, Janaka Alawatugoda authored at least 24 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions.
Cryptogr., March, 2023

Robust Cross Directional Controller Design for Paper Machine Spatial Distributed System.
IEEE Access, 2023

Mixed-Reality Based Multi-Agent Robotics Framework for Artificial Swarm Intelligence Experiments.
IEEE Access, 2023

Unveiling Copy-Move Forgeries: Enhancing Detection With SuperPoint Keypoint Architecture.
IEEE Access, 2023

2022
Correlation power analysis attack on software implementation of TRIVIUM stream cipher.
Int. J. Inf. Comput. Secur., 2022

On power analysis attacks against hardware stream ciphers.
Int. J. Inf. Comput. Secur., 2022

Standard model leakage-resilient authenticated key exchange using inner-product extractors.
Des. Codes Cryptogr., 2022

On Advances of Lattice-Based Cryptographic Schemes and Their Implementations.
Cryptogr., 2022

2021
Anonymous and Distributed Authentication for Peer-to-Peer Networks.
IACR Cryptol. ePrint Arch., 2021

2020
Public-Key Encryption In The Standard Model Against Strong Leakage Adversary.
Comput. J., 2020

2019
Review on Leakage Resilient Key Exchange Security Model.
Int. J. Commun. Networks Inf. Secur., 2019

2017
Generic construction of an eCK -secure key exchange protocol in the standard model.
Int. J. Inf. Sec., 2017

New Approach to Practical Leakage-Resilient Public-Key Cryptography.
IACR Cryptol. ePrint Arch., 2017

Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting.
Proceedings of the Provable Security, 2017

Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack.
Proceedings of the 2017 IEEE International Conference on Industrial and Information Systems, 2017

2016
On the Leakage-Resilient Key Exchange.
IACR Cryptol. ePrint Arch., 2016

2015
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange.
IACR Cryptol. ePrint Arch., 2015

Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model.
IACR Cryptol. ePrint Arch., 2015

2014
Protecting Encrypted Cookies from Compression Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2014

Modelling After-the-fact Leakage for Key Exchange.
IACR Cryptol. ePrint Arch., 2014

Continuous After-the-fact Leakage-Resilient Key Exchange (full version).
IACR Cryptol. ePrint Arch., 2014

Software implementation level countermeasures against the cache timing attack on advanced encryption standard.
CoRR, 2014

Countermeasures against Bernstein's remote cache timing attack.
CoRR, 2014

Continuous After-the-Fact Leakage-Resilient Key Exchange.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014


  Loading...