Poulami Das

Orcid: 0000-0002-7404-8504

Affiliations:
  • Technische Universität Darmstadt, Germany
  • Indian Institute of Technology Kharagpur, India (former)


According to our database1, Poulami Das authored at least 18 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
BIP32-Compatible Threshold Wallets.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Round Efficient Byzantine Agreement from VDFs.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Shared-Custodial Password-Authenticated Deterministic Wallets.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Secure Infrastructures in the Realm of Decentralization.
PhD thesis, 2023

BIP32-Compatible Threshold Wallets.
IACR Cryptol. ePrint Arch., 2023

2022
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
The Exact Security of BIP32 Wallets.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
DPaSE: Distributed Password-Authenticated Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2020

Deterministic Wallets in a Quantum World.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
FastKitten: Practical Smart Contracts on Bitcoin.
Proceedings of the 28th USENIX Security Symposium, 2019

A Formal Treatment of Deterministic Wallets.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2017
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands.
Proceedings of the PROOFS 2017, 2017

2016
Secure public key hardware for IoT applications.
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016

Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Improved Atomicity to Prevent HCCA on NIST Curves.
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016

2015
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance.
IACR Cryptol. ePrint Arch., 2015

ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p).
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015


  Loading...