Nimish Mishra

Orcid: 0000-0002-8585-9425

According to our database1, Nimish Mishra authored at least 25 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Uncovering Security Vulnerabilities in Intel Trust Domain Extensions.
IACR Cryptol. ePrint Arch., 2025

TERRA : Trojan-Resilient Reverse-Firewall for Cryptographic Applications.
IACR Cryptol. ePrint Arch., 2025

Architectural Leakage Analysis of Masked Cryptographic Software on RISC-V Cores.
IACR Cryptol. ePrint Arch., 2025

IND-CPA<sup>C</sup>: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2025

IND-CPA<sup>bf C</sup>: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption.
Proceedings of the Post-Quantum Cryptography - 16th International Workshop, 2025

"OOPS!": Out-Of-Band Remote Power Side-Channel Attacks on Intel SGX and TDX.
Proceedings of the 62nd ACM/IEEE Design Automation Conference, 2025

Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

Unified FPGA Design of Kyber and Dilithium with Provable Fault Tolerance.
Proceedings of the 36th IEEE International Conference on Application-specific Systems, 2025

2024
A survey on security and cryptographic perspective of Industrial-Internet-of-Things.
Internet Things, April, 2024

Quantum-Assisted Activation for Supervised Learning in Healthcare-Based Intrusion Detection Systems.
IEEE Trans. Artif. Intell., March, 2024

Blockchain-Based User Authentication and Data-Sharing Framework for Healthcare Industries.
IEEE Trans. Netw. Sci. Eng., 2024

CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2024

Shesha : Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors.
Proceedings of the 33rd USENIX Security Symposium, 2024

"There's Always Another Counter": Detecting Micro-Architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2024

Faults in Our Bus: Novel Bus Fault Attack to Break ARM TrustZone.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel Processors.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

2023
SEC: Fast Private Boolean Circuit Evaluation from Encrypted Look-ups.
IACR Cryptol. ePrint Arch., 2023

Modelling Delay-based Physically Unclonable Functions through Particle Swarm Optimization.
IACR Cryptol. ePrint Arch., 2023

On the Amplification of Cache Occupancy Attacks in Randomized Cache Architectures.
CoRR, 2023

BCTPV-NIZK: Publicly-Verifiable Non-interactive Zero-Knowledge Proof System from Minimal Blockchain Assumptions.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2022
Time's a Thief of Memory - Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
A comprehensive review on collision-resistant hash functions on lattices.
J. Inf. Secur. Appl., 2021

2020
Automation of quantum Braitenberg vehicles using finite automata: Moore machines.
Quantum Inf. Process., 2020


  Loading...