Srinivas Vivek

Orcid: 0000-0002-8426-0859

Affiliations:
  • International Institute of Information Technology Bangalore, India
  • University of Bristol, UK (former)
  • University of Luxembourg, Luxembourg (PhD 2015)


According to our database1, Srinivas Vivek authored at least 36 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Ciphertext-Only Attack on a Secure k-NN Computation on Cloud.
CoRR, 2024

Consent Service Architecture for Policy-Based Consent Management in Data Trusts.
Proceedings of the 7th Joint International Conference on Data Science & Management of Data (11th ACM IKDD CODS and 29th COMAD), 2024

2023
A Faster Third-Order Masking of Lookup Tables.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Attack on the Privacy-Preserving Carpooling Service TAROT.
Proceedings of the Information Systems Security - 19th International Conference, 2023

Attack on "A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server".
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Integer Polynomial Recovery from Outputs and its Application to Cryptanalysis of a Protocol for Secure Sorting.
IACR Cryptol. ePrint Arch., 2022

Driver Locations Harvesting Attack on pRide.
Proceedings of the Network and System Security - 16th International Conference, 2022

Revealing Parameters of Control Policies Encrypted using Multiplicative Homomorphic Encryption Schemes.
Proceedings of the IEEE Conference on Control Technology and Applications, 2022

Passive Triangulation Attack on ORide.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Higher-Order Lookup Table Masking in Essentially Constant Memory.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Comments on "A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server".
CoRR, 2021

Revisiting Driver Anonymity in ORide.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Attacks on a Privacy-Preserving Publish-Subscribe System and a Ride-Hailing Service.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021

2020
Second-Order Masked Lookup Table Compression Scheme.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage.
IACR Cryptol. ePrint Arch., 2020

2019
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data.
IACR Cryptol. ePrint Arch., 2019

2017
Revisiting a Masked Lookup-Table Compression Scheme.
IACR Cryptol. ePrint Arch., 2017

Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables.
IACR Cryptol. ePrint Arch., 2017

Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures.
IACR Cryptol. ePrint Arch., 2017

Image Classification using non-linear Support Vector Machines on Encrypted Data.
IACR Cryptol. ePrint Arch., 2017

2016
Implementation of a leakage-resilient ElGamal key encapsulation mechanism.
J. Cryptogr. Eng., 2016

Reducing the Number of Non-linear Multiplications in Masking Schemes.
IACR Cryptol. ePrint Arch., 2016

Fixed Point Arithmetic in SHE Scheme.
IACR Cryptol. ePrint Arch., 2016

Faster Homomorphic Evaluation of Discrete Fourier Transforms.
IACR Cryptol. ePrint Arch., 2016

Fixed-Point Arithmetic in SHE Schemes.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

2015
Practical Provable Security against Side-Channel Attacks.
PhD thesis, 2015

Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures.
J. Cryptogr. Eng., 2015

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Cubic Sieve Congruence of the Discrete Logarithm Problem, and fractional part sequences.
J. Symb. Comput., 2014

Limits of a conjecture on a leakage-resilient cryptosystem.
Inf. Process. Lett., 2014

Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2014

2013
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012.
IACR Cryptol. ePrint Arch., 2013

A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

2012
A Practical Leakage-Resilient Signature Scheme in the Generic Group Model.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012


  Loading...