Srinivas Vivek
Title
Cited by
Cited by
Year
Leakage-resilient authentication and encryption from symmetric cryptographic primitives
O Pereira, FX Standaert, S Vivek
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
702015
Fixed-point arithmetic in SHE schemes
A Costache, NP Smart, S Vivek, A Waller
International Conference on Selected Areas in Cryptography, 401-422, 2016
612016
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
A Roy, S Vivek
Cryptographic Hardware and Embedded Systems - CHES 2013, 417-434, 2013
482013
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures
JS Coron, A Roy, S Vivek
Journal of Cryptographic Engineering 5 (2), 73-83, 2015
472015
A practical leakage-resilient signature scheme in the generic group model
D Galindo, S Vivek
International Conference on Selected Areas in Cryptography, 50-65, 2012
312012
Faster secure multi-party computation of AES and DES using lookup tables
M Keller, E Orsini, D Rotaru, P Scholl, E Soria-Vazquez, S Vivek
International Conference on Applied Cryptography and Network Security, 229-249, 2017
242017
Image classification using non-linear support vector machines on encrypted data
A Barnett, J Santokhi, M Simpson, NP Smart, C Stainton-Bygrave, S Vivek, ...
Cryptology ePrint Archive, 2017
222017
Implementation of a leakage-resilient ElGamal key encapsulation mechanism
D Galindo, J Großschädl, Z Liu, PK Vadnala, S Vivek
Journal of Cryptographic Engineering 6 (3), 229-238, 2016
22*2016
Faster Homomorphic Evaluation of Discrete Fourier Transforms
A Costache, NP Smart, S Vivek
152016
Integer Complexity: Breaking the θ(n2) barrier
V Srinivas Vivek, BR Shankar
http://hdl.handle.net/10993/18508, 2008
132008
Generalized polynomial decomposition for s-boxes with application to side-channel countermeasures
D Goudarzi, M Rivain, D Vergnaud, S Vivek
International Conference on Cryptographic Hardware and Embedded Systems, 154-171, 2017
92017
A leakage-resilient pairing-based variant of the Schnorr signature scheme
D Galindo, S Vivek
IMA International Conference on Cryptography and Coding, 173-192, 2013
82013
Reducing the number of non-linear multiplications in masking schemes
J Pulkus, S Vivek
International Conference on Cryptographic Hardware and Embedded Systems, 479-497, 2016
62016
Limits of a conjecture on a leakage-resilient cryptosystem
D Galindo, S Vivek
Information Processing Letters 114 (4), 192-196, 2014
52014
Second-Order Masked Lookup Table Compression Scheme
A Valiveti, S Vivek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 129-153, 2020
32020
Revisiting a Masked Lookup-Table Compression Scheme
S Vivek
International Conference on Cryptology in India, 369-383, 2017
22017
Processing Encrypted Data Using Homomorphic Encryption
A Barnett, C Bonte, C Bootland, JW Bos, W Castryck, A Costache, ...
Workshop on Data Mining with Secure Computation, SODA project, 2017
22017
Revisiting Driver Anonymity in ORide
D Kumaraswamy, S Murthy, S Vivek
arXiv preprint arXiv:2101.06419, 2021
12021
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data
S Murthy, S Vivek
IMA International Conference on Cryptography and Coding, 278-294, 2019
12019
Practical provable security against side-channel attacks
SV Venkatesh
University of Luxembourg, Luxembourg, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20