Prasanna Ravi

Orcid: 0000-0003-0201-3705

According to our database1, Prasanna Ravi authored at least 38 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption A Case Study on Crystals-Kyber.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM.
IACR Cryptol. ePrint Arch., 2024

2023
Implementation attacks on post-quantum lattice-based cryptography
PhD thesis, 2023

Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber.
IACR Cryptol. ePrint Arch., 2023

Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software.
IACR Cryptol. ePrint Arch., 2023

Et tu, Brute? SCA Assisted CCA using Valid Ciphertexts - A Case Study on HQC KEM.
IACR Cryptol. ePrint Arch., 2023

Invited Paper: Machine Learning Based Blind Side-Channel Attacks on PQC-Based KEMs - A Case Study of Kyber KEM.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

2022
On Exploiting Message Leakage in (Few) NIST PQC Candidates for Practical Message Recovery Attacks.
IEEE Trans. Inf. Forensics Secur., 2022

Practical Multiple Persistent Faults Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Security and Quantum Computing: An Overview.
IACR Cryptol. ePrint Arch., 2022

Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results.
IACR Cryptol. ePrint Arch., 2022

Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs.
IACR Cryptol. ePrint Arch., 2022

Lattice-based Key-sharing Schemes: A Survey.
ACM Comput. Surv., 2022

Efficient Loop Abort Fault Attacks on Supersingular Isogeny based Key Exchange (SIKE).
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2022

2021
Generic Side-Channel Assisted Chosen-Ciphertext Attacks on Streamlined NTRU Prime.
IACR Cryptol. ePrint Arch., 2021

Practical Side-Channel and Fault Attacks on Lattice-Based Cryptography.
Proceedings of the 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021

On Threat of Hardware Trojan to Post-Quantum Lattice-Based Schemes: A Key Recovery Attack on SABER and Beyond.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

2020
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4.
IACR Cryptol. ePrint Arch., 2020

On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks.
IACR Cryptol. ePrint Arch., 2020

Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks.
IACR Cryptol. ePrint Arch., 2020

Authentication Protocol for Secure Automotive Systems: Benchmarking Post-Quantum Cryptography.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

2019
Security is an architectural design constraint.
Microprocess. Microsystems, 2019

Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes.
IACR Cryptol. ePrint Arch., 2019

Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates.
IACR Cryptol. ePrint Arch., 2019

Improving Speed of Dilithium's Signing Procedure.
IACR Cryptol. ePrint Arch., 2019

Number "Not Used" Once - Practical Fault Attack on pqm4 Implementations of NIST Candidates.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019

2018
Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate.
IACR Cryptol. ePrint Arch., 2018

Number "Not" Used Once - Key Recovery Fault Attacks on LWE Based Lattice Cryptographic Schemes.
IACR Cryptol. ePrint Arch., 2018

PPAP and iPPAP: PLL-Based Protection Against Physical Attacks.
Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI, 2018

Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC.
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018

2016
RunStream: A High-Level Rapid Prototyping Framework for Stream Ciphers.
ACM Trans. Embed. Comput. Syst., 2016

2014
One Word/Cycle HC-128 Accelerator via State-Splitting Optimization.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014


  Loading...