Aikata .
Dipl.-Ing. B.Tech.Secure Systems, PhD Candidate

Bachelor thesis Students
1. Tatiana Kirillova: Automated High-depth Privacy-preserving Polynomial Approximation Evaluation
2. Simon Mussbacher: The Joy of Hardware Implemenation Using ChatGPT
3. Sabrina Schunn: Analysis of Polynomial Multipliers for Post-quantum Schemes
4. Emira Salkic: Masking Hybrid Homomorphic Encryption Scheme- HERA
5. Sarah Hartinger: Designing approximated Machine Learning models in Python for Homomorphic evaluation.
6. Dennis Günter Köb: Polynomial Arithmetic Tools.
7. Vincent Pischler: Application-based comparative study of FHE schemes.
8. Teodora-Alexandra Alexandrescu: Hardware Evaluation of modular multiplication methods.
9. Julian Sechshauser: Hardware Implementation of Ascon using ChatGPT.
Master thesis Students
1. Daniel Sanz Sobrino: Unified Cryptography Standards on RISC-V
2. Lando Momo Paul Junior: Designing approximated Machine Learning models for Homomorphic evaluation.
3. Vid Smole: HW Implementation of Falcon Signature Scheme
4. Robert Leiner: HW Implementation of Falcon Signature Scheme
5. Ian Khodachenko: Privacy-preserving DNN training

Research
BLOGS:- The Role of NTT in PQC, FHE, and ZKP
- FHERMA challenge winning solutions.
- Matrix Multiplication challenge solution description.
- SIGN challenge solution description.
- Logistic Regression challenge description.
Publications
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials
Kundu A., Ghosh S., Aikata A., Saha D.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(3), 614-643
REED
Aikata A., Mert A., Kwon S., Deryabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2), 163-208
PASTA on Edge: Cryptoprocessor for Hybrid Homomorphic Encryption
Aikata A., Sanz Sobrino D., Sinha Roy S.
DATE: Design, Automation and Test in Europe Conference, 2025 Design, Automation and Test in Europe Conference: DATE 2025
REED: Chiplet-Based Scalable Hardware Accelerator for Fully Homomorphic Encryption
Aikata A., Mert A., Kwon S., Deryabin M., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025(2)
Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs
Ravi P., Bhasin S., Chattopadhyay A., Aikata A., Sinha Roy S.
GLSVLSI 2024 - Proceedings of the Great Lakes Symposium on VLSI 2024, 34th Great Lakes Symposium on VLSI, 216 - 221