Janaka Alawatugoda
Janaka Alawatugoda
Department of Computer Engineering, University of Peradeniya
Verified email at eng.pdn.ac.lk - Homepage
Cited by
Cited by
Modelling after-the-fact leakage for key exchange
J Alawatugoda, D Stebila, C Boyd
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Continuous after-the-fact leakage-resilient key exchange
J Alawatugoda, C Boyd, D Stebila
australasian conference on information security and privacy, 258-273, 2014
Continuous after-the-fact leakage-resilient eck-secure key exchange
J Alawatugoda, D Stebila, C Boyd
IMA international conference on cryptography and coding, 277-294, 2015
Countermeasures against Bernstein's remote cache timing attack
J Alawatugoda, D Jayasinghe, R Ragel
2011 6th International Conference on Industrial and Information Systems, 43-48, 2011
On the leakage-resilient key exchange
J Alawatugoda
Journal of Mathematical Cryptology 11 (4), 215-269, 2017
Protecting encrypted cookies from compression side-channel attacks
J Alawatugoda, D Stebila, C Boyd
International Conference on Financial Cryptography and Data Security, 86-106, 2015
Software implementation level countermeasures against the cache timing attack on advanced encryption standard
U Herath, J Alawatugoda, R Ragel
2013 IEEE 8th International Conference on Industrial and Information Systems …, 2013
Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting
S Chakraborty, J Alawatugoda, CP Rangan
International Conference on Provable Security, 167-187, 2017
New approach to practical leakage-resilient public-key cryptography
S Chakraborty, J Alawatugoda, CP Rangan
Journal of Mathematical Cryptology 14 (1), 172-201, 2020
Generic construction of an eCK -secure key exchange protocol in the standard model
J Alawatugoda
International Journal of Information Security 16 (5), 541-557, 2017
On the leakage resilience of secure channel establishment
JAB Alawatugoda
Queensland University of Technology, 2015
Review on leakage resilient key exchange security models
CCZ Wei, CC Wen, J Alawatugoda
International Journal of Communication Networks and Information Security 11 …, 2019
Analysis of Four Historical Ciphers Against Known Plaintext Frequency Statistical Attack
CC Wen, L Samylingam, I Darmawan, PSS Palaniappan, CFM Foozy, ...
International Journal of Integrated Engineering 10 (6), 2018
Public-Key Encryption In The Standard Model Against Strong Leakage Adversary
J Alawatugoda
The Computer Journal 63 (12), 1904-1914, 2020
BAT—Block Analytics Tool Integrated with Blockchain Based IoT Platform
C Edussuriya, K Vithanage, N Bandara, J Alawatugoda, M Sandirigama, ...
Electronics 9 (9), 1525, 2020
Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack
J Alupotha, S Prasadi, J Alawatugoda, R Ragel, M Fawsan
2017 IEEE International Conference on Industrial and Information Systems …, 2017
Leakage-resilient storage scheme for cryptographic applications
J Alawatugoda, R Ragel, D Eranga, N Jayanath, C Somathilaka
2016 IEEE International Conference on Information and Automation for …, 2016
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
I Sankalpa, T Dhanushka, N Amarasinghe, J Alawathugoda, R Ragel
2016 Manufacturing & Industrial Engineering Symposium (MIES), 1-5, 2016
Implementing a Secure Key Exchange Protocol for OpenSSL
J Alawatugoda, S Vivekaanathan, N Peiris, C Wickramasinghe, CC Wen
On Compression Ratio Info-leak Mass Exploitation (CRIME) Attack and Countermeasures
S Prasadi, J Alupotha, M Fawzan, J Alawatugoda, R Ragel
The system can't perform the operation now. Try again later.
Articles 1–20