Volgen
Janaka Alawatugoda
Janaka Alawatugoda
Rabdan Academy, Abu Dhabi, UAE; Griffith University, Brisbane, Australia
Geverifieerd e-mailadres voor ra.ac.ae
Titel
Geciteerd door
Geciteerd door
Jaar
Modelling after-the-fact leakage for key exchange
J Alawatugoda, D Stebila, C Boyd
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
602014
Continuous after-the-fact leakage-resilient key exchange
J Alawatugoda, C Boyd, D Stebila
Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014
412014
Continuous after-the-fact leakage-resilient eck-secure key exchange
J Alawatugoda, D Stebila, C Boyd
Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015
342015
A review of the nist lightweight cryptography finalists and their fault analyses
H Madushan, I Salam, J Alawatugoda
Electronics 11 (24), 4199, 2022
242022
Protecting encrypted cookies from compression side-channel attacks
J Alawatugoda, D Stebila, C Boyd
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
182015
Countermeasures against Bernstein's remote cache timing attack
J Alawatugoda, D Jayasinghe, R Ragel
2011 6th International Conference on Industrial and Information Systems, 43-48, 2011
182011
On the leakage-resilient key exchange
J Alawatugoda
Journal of Mathematical Cryptology 11 (4), 215-269, 2017
122017
A new frontier in streamflow modeling in ungauged basins with sparse data: A modified generative adversarial network with explainable AI
U Perera, DTS Coralage, IU Ekanayake, J Alawatugoda, DPP Meddage
Results in Engineering 21, 101920, 2024
112024
On advances of lattice-based cryptographic schemes and their implementations
H Bandara, Y Herath, T Weerasundara, J Alawatugoda
Cryptography 6 (4), 56, 2022
102022
Software implementation level countermeasures against the cache timing attack on advanced encryption standard
U Herath, J Alawatugoda, R Ragel
2013 IEEE 8th International Conference on Industrial and Information Systems …, 2013
92013
Unveiling copy-move forgeries: Enhancing detection with SuperPoint keypoint architecture
A Diwan, D Kumar, R Mahadeva, HCS Perera, J Alawatugoda
IEEE Access, 2023
82023
Generic construction of an eCK-secure key exchange protocol in the standard model
J Alawatugoda
International Journal of Information Security 16 (5), 541-557, 2017
8*2017
Mixed-reality based multi-agent robotics framework for artificial swarm intelligence experiments
D Karunarathna, N Jaliyagoda, G Jayalath, J Alawatugoda, R Ragel, ...
IEEE Access, 2023
62023
Bat—block analytics tool integrated with blockchain based iot platform
C Edussuriya, K Vithanage, N Bandara, J Alawatugoda, M Sandirigama, ...
Electronics 9 (9), 1525, 2020
62020
Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting
S Chakraborty, J Alawatugoda, C Pandu Rangan
Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017
62017
On power analysis attacks against hardware stream ciphers
RD Silva, I Navaratna, M Kumarasiri, J Alawatugoda, CC Wen
International Journal of Information and Computer Security 17 (1-2), 21-35, 2022
52022
Review on leakage resilient key exchange security models
CCZ Wei, CC Wen, J Alawatugoda
International Journal of Communication Networks and Information Security 11 …, 2019
5*2019
Peer-to-peer energy trading through swarm intelligent Stackelberg game
C Edussuriya, U Marikkar, S Wickramasinghe, U Jayasinghe, ...
Energies 16 (5), 2434, 2023
42023
New approach to practical leakage-resilient public-key cryptography
S Chakraborty, J Alawatugoda, CP Rangan
Journal of Mathematical Cryptology 14 (1), 172-201, 2020
42020
Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack
J Alupotha, S Prasadi, J Alawatugoda, R Ragel, M Fawsan
2017 IEEE International Conference on Industrial and Information Systems …, 2017
42017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20