Follow
Janaka Alawatugoda
Janaka Alawatugoda
Rabdan Academy, Abu Dhabi, UAE; Griffith University, Brisbane, Australia
Verified email at ra.ac.ae
Title
Cited by
Cited by
Year
Modelling after-the-fact leakage for key exchange
J Alawatugoda, D Stebila, C Boyd
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
562014
Continuous after-the-fact leakage-resilient key exchange
J Alawatugoda, C Boyd, D Stebila
Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014
382014
Continuous after-the-fact leakage-resilient eck-secure key exchange
J Alawatugoda, D Stebila, C Boyd
Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015
312015
Countermeasures against Bernstein's remote cache timing attack
J Alawatugoda, D Jayasinghe, R Ragel
2011 6th International Conference on Industrial and Information Systems, 43-48, 2011
182011
Protecting encrypted cookies from compression side-channel attacks
J Alawatugoda, D Stebila, C Boyd
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
172015
A review of the nist lightweight cryptography finalists and their fault analyses
H Madushan, I Salam, J Alawatugoda
Electronics 11 (24), 4199, 2022
132022
On the leakage-resilient key exchange
J Alawatugoda
Journal of Mathematical Cryptology 11 (4), 215-269, 2017
112017
Software implementation level countermeasures against the cache timing attack on advanced encryption standard
U Herath, J Alawatugoda, R Ragel
2013 IEEE 8th International Conference on Industrial and Information Systems …, 2013
92013
Generic construction of an eCK-secure key exchange protocol in the standard model
J Alawatugoda
International Journal of Information Security 16 (5), 541-557, 2017
8*2017
Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting
S Chakraborty, J Alawatugoda, C Pandu Rangan
Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017
62017
Review on leakage resilient key exchange security models
CCZ Wei, CC Wen, J Alawatugoda
International Journal of Communication Networks and Information Security 11 …, 2019
5*2019
Bat—block analytics tool integrated with blockchain based iot platform
C Edussuriya, K Vithanage, N Bandara, J Alawatugoda, M Sandirigama, ...
Electronics 9 (9), 1525, 2020
42020
New approach to practical leakage-resilient public-key cryptography
S Chakraborty, J Alawatugoda, CP Rangan
Journal of Mathematical Cryptology 14 (1), 172-201, 2020
42020
Peer-to-peer energy trading through swarm intelligent Stackelberg game
C Edussuriya, U Marikkar, S Wickramasinghe, U Jayasinghe, ...
Energies 16 (5), 2434, 2023
32023
On advances of lattice-based cryptographic schemes and their implementations
H Bandara, Y Herath, T Weerasundara, J Alawatugoda
Cryptography 6 (4), 56, 2022
32022
Standard model leakage-resilient authenticated key exchange using inner-product extractors
J Alawatugoda, T Okamoto
Designs, Codes and Cryptography, 1-21, 2022
32022
On power analysis attacks against hardware stream ciphers
RD Silva, I Navaratna, M Kumarasiri, J Alawatugoda, CC Wen
International Journal of Information and Computer Security 17 (1-2), 21-35, 2022
32022
Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack
J Alupotha, S Prasadi, J Alawatugoda, R Ragel, M Fawsan
2017 IEEE International Conference on Industrial and Information Systems …, 2017
32017
On implementing a client-server setting to prevent the browser reconnaissance and exfiltration via adaptive compression of hypertext (BREACH) attacks
I Sankalpa, T Dhanushka, N Amarasinghe, J Alawathugoda, R Ragel
2016 Manufacturing & Industrial Engineering Symposium (MIES), 1-5, 2016
32016
On the leakage resilience of secure channel establishment
JAB Alawatugoda
Queensland University of Technology, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20