We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Preventing a Cryptoapocalypse
Sinha Roy S., Banerjee U.
IEEE Solid-State Circuits Magazine, Vol. 15, 38-44
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Mert A., Aikata A., Kwon S., Shiin Y., Yoo D., Lee Y., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2023(1), 463-500
Time-Memory Trade-Offs for Saber+ on Memory-Constrained RISC-V Platform
Zhang J., Huang J., Liu Z., Sinha Roy S.
IEEE Transactions on Computers, Vol. 71(11), 2996-3007
KaLi: A Crystal for Post-Quantum Security Using Kyber and Dilithium
Aikata A., Mert A., Imran M., Pagliarini S., Sinha Roy S.
IEEE Transactions on Circuits and Systems I: Regular Papers, Vol. 2022, 1-12
Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
Ravi P., Ezerman M., Bhasin S., Chattopadhyay A., Sinha Roy S.
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022(1), 722–761
On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery Attacks
Ravi P., Bhasin S., Sinha Roy S., Chattopadhyay A.
IEEE Transactions on Information Forensics and Security, Vol. 17, 684-699
Design Space Exploration of SABER in 65nm ASIC
Imran M., Almeida F., Raik J., Basso A., Sinha Roy S., Pagliarini S.
ASHES '21: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 5th Workshop on Attacks and Solutions in Hardware Security, 85-90
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber
Xu Z., Pemberton O., Sinha Roy S., Oswald D., Yao W., Zheng Z.
IEEE Transactions on Computers
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
Sinha Roy S., Basso A.
2021 58th ACM/IEEE Design Automation Conference (DAC), 58th Design Automation Conference, 1285-1290