Srinivas Vivek
Title
Cited by
Cited by
Year
Leakage-resilient authentication and encryption from symmetric cryptographic primitives
O Pereira, FX Standaert, S Vivek
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
622015
Fixed-point arithmetic in SHE schemes
A Costache, NP Smart, S Vivek, A Waller
International Conference on Selected Areas in Cryptography, 401-422, 2016
592016
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
A Roy, S Vivek
Cryptographic Hardware and Embedded Systems - CHES 2013, 417-434, 2013
442013
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures
JS Coron, A Roy, S Vivek
Journal of Cryptographic Engineering 5 (2), 73-83, 2015
392015
A practical leakage-resilient signature scheme in the generic group model
D Galindo, S Vivek
International Conference on Selected Areas in Cryptography, 50-65, 2012
282012
Implementation of a leakage-resilient ElGamal key encapsulation mechanism
D Galindo, J Großschädl, Z Liu, PK Vadnala, S Vivek
Journal of Cryptographic Engineering 6 (3), 229-238, 2016
21*2016
Faster secure multi-party computation of AES and DES using lookup tables
M Keller, E Orsini, D Rotaru, P Scholl, E Soria-Vazquez, S Vivek
International Conference on Applied Cryptography and Network Security, 229-249, 2017
172017
Image Classification using non-linear Support Vector Machines on Encrypted Data.
A Barnett, J Santokhi, M Simpson, NP Smart, C Stainton-Bygrave, S Vivek, ...
IACR Cryptol. ePrint Arch. 2017, 857, 2017
172017
Faster Homomorphic Evaluation of Discrete Fourier Transforms
A Costache, NP Smart, S Vivek
132016
Integer Complexity: Breaking the θ(n2) barrier
V Srinivas Vivek, BR Shankar
http://hdl.handle.net/10993/18508, 2008
132008
A leakage-resilient pairing-based variant of the Schnorr signature scheme
D Galindo, S Vivek
IMA International Conference on Cryptography and Coding, 173-192, 2013
82013
Generalized polynomial decomposition for s-boxes with application to side-channel countermeasures
D Goudarzi, M Rivain, D Vergnaud, S Vivek
International Conference on Cryptographic Hardware and Embedded Systems, 154-171, 2017
62017
Reducing the number of non-linear multiplications in masking schemes
J Pulkus, S Vivek
International Conference on Cryptographic Hardware and Embedded Systems, 479-497, 2016
62016
Limits of a conjecture on a leakage-resilient cryptosystem
D Galindo, S Vivek
Information Processing Letters 114 (4), 192-196, 2014
52014
Processing Encrypted Data Using Homomorphic Encryption
A Barnett, C Bonte, C Bootland, JW Bos, W Castryck, A Costache, ...
Workshop on Data Mining with Secure Computation, SODA project, 2017
22017
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data
S Murthy, S Vivek
IMA International Conference on Cryptography and Coding, 278-294, 2019
12019
Revisiting a Masked Lookup-Table Compression Scheme
S Vivek
International Conference on Cryptology in India, 369-383, 2017
12017
Practical provable security against side-channel attacks
SV Venkatesh
University of Luxembourg, Luxembourg, 2015
12015
Cubic Sieve Congruence of the Discrete Logarithm Problem, and fractional part sequences
S Vivek, CEV Madhavan
Journal of Symbolic Computation 64, 22-34, 2014
12014
On A Cubic Sieve Congruence Related To The Discrete Logarithm Problem
SV Vivek
12013
The system can't perform the operation now. Try again later.
Articles 1–20