Praveen Kumar Vadnala

According to our database1, Praveen Kumar Vadnala authored at least 14 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Practical Improvements to Statistical Ineffective Fault Attacks.
IACR Cryptol. ePrint Arch., 2024

2022
On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2017
Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Implementation of a leakage-resilient ElGamal key encapsulation mechanism.
J. Cryptogr. Eng., 2016

Shuffling across rounds: A lightweight strategy to counter side-channel attacks.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016

2015
Provably Secure Countermeasures against Side-channel Attacks.
PhD thesis, 2015

Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON.
Proceedings of the Topics in Cryptology, 2015

Faster Mask Conversion with Lookup Tables.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

2014
Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2014

Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity.
IACR Cryptol. ePrint Arch., 2014

Secure Conversion between Boolean and Arithmetic Masking of Any Order.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Algorithms for Switching between Boolean and Arithmetic Masking of Second Order.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

2012
Conversion of Security Proofs from One Leakage Model to Another: A New Issue.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

2006
An Efficient Key Assignment Scheme for Access Control in a Hierarchy.
Proceedings of the Information Systems Security, Second International Conference, 2006


  Loading...