Profil

VENKATESH Srinivas Vivek

Main Referenced Co-authors
Galindo, David  (4)
B. R., Shankar (1)
C. E. Veni Madhavan (1)
CORON, Jean-Sébastien  (1)
GROSZSCHÄDL, Johann  (1)
Main Referenced Keywords
Cryptography (2); Leakage-resilient cryptography (2); block cipher; S-box; masking complexity; addition chain; polynomial evaluation; side-channel attack (1); Computational number theory (1); continual leakage (1);
Main Referenced Disciplines
Computer science (9)

Publications (total 9)

The most downloaded
1121 downloads
Venkatesh, S. V. (2015). Practical Provable Security against Side-Channel Attacks [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/21578 https://hdl.handle.net/10993/21578

The most cited

36 citations (Scopus®)

Roy, A., & Venkatesh, S. V. (2013). Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012. In G. Bertoni & J.-S. Coron (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2013 (pp. 417-434). Springer Berlin Heidelberg. doi:10.1007/978-3-642-40349-1_24 https://hdl.handle.net/10993/15273

Galindo, D., Groszschädl, J., Liu, Z., Vadnala, P. K., & Venkatesh, S. V. (September 2016). Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism. Journal of Cryptographic Engineering, 6 (3), 229-238. doi:10.1007/s13389-016-0121-x
Peer reviewed

Venkatesh, S. V. (2015). Practical Provable Security against Side-Channel Attacks [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/21578

Coron, J.-S., Roy, A., & Venkatesh, S. V. (2014). Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. In L. Batina & M. Robshaw (Eds.), Cryptographic Hardware and Embedded Systems – CHES 2014 (pp. 170-187). Springer. doi:10.1007/978-3-662-44709-3_10
Peer reviewed

Venkatesh, S. V., & C. E. Veni Madhavan. (2014). Cubic Sieve Congruence of the Discrete Logarithm Problem, and fractional part sequences. Journal of Symbolic Computation, 64, 22-34. doi:10.1016/j.jsc.2013.12.004
Peer Reviewed verified by ORBi

Galindo, D., & Venkatesh, S. V. (2014). Limits of a conjecture on a leakage-resilient cryptosystem. Information Processing Letters, 114 (4), 192-196. doi:10.1016/j.ipl.2013.11.014
Peer Reviewed verified by ORBi

Galindo, D., & Venkatesh, S. V. (2013). A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme. In M. Stam (Ed.), Cryptography and Coding (pp. 173-192). Springer. doi:10.1007/978-3-642-45239-0_11
Peer reviewed

Roy, A., & Venkatesh, S. V. (2013). Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012. In G. Bertoni & J.-S. Coron (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2013 (pp. 417-434). Springer Berlin Heidelberg. doi:10.1007/978-3-642-40349-1_24
Peer reviewed

Galindo, D., & Venkatesh, S. V. (2013). A Practical Leakage-Resilient Signature Scheme in the Generic Group Model. In L. Knudsen & H. Wu (Eds.), Selected Areas in Cryptography (pp. 50-65). Springer Berlin Heidelberg. doi:10.1007/978-3-642-35999-6_4
Peer reviewed

Venkatesh, S. V., & B. R., S. (2008). Integer Complexity: Breaking the θ(n2) barrier. (Updated October 23, 2014). ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/18508.

Contact ORBilu