@misc{cryptoeprint:2024/1170,author={Kundu, Suparna and Ghosh, Archisman and Karmakar, Angshuman and Sen, Shreyas and Verbauwhede, Ingrid},title={Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism},howpublished={Cryptology {ePrint} Archive, Paper 2024/1170},year={2025},url={https://eprint.iacr.org/2024/1170},}
CT-RSA’25
Masking Gaussian Elimination at Arbitrary Order, with Application to Multivariate- and Code-Based PQC
Quinten Norga, Suparna Kundu, Uttam Kumar Ojha, Anindya Ganguly, Angshuman Karmakar, and
1 more author
@misc{cryptoeprint:2024/1777,author={Norga, Quinten and Kundu, Suparna and Ojha, Uttam Kumar and Ganguly, Anindya and Karmakar, Angshuman and Verbauwhede, Ingrid},title={Masking Gaussian Elimination at Arbitrary Order, with Application to Multivariate- and Code-Based {PQC}},howpublished={Cryptology {ePrint} Archive, Paper 2024/1777},year={2025},url={https://eprint.iacr.org/2024/1777},}
MSR’25
SCRUBD: Smart Contracts Reentrancy and Unhandled Exceptions Vulnerability Dataset
@misc{yashavant2024scrubdsmartcontractsreentrancy,title={SCRUBD: Smart Contracts Reentrancy and Unhandled Exceptions Vulnerability Dataset},author={Yashavant, Chavhan Sujeet and Chavda, MitrajSinh and Kumar, Saurabh and Karkare, Amey and Karmakar, Angshuman},year={2025},eprint={2412.09935},archiveprefix={arXiv},primaryclass={cs.CR},url={https://arxiv.org/abs/2412.09935},}
2024
D&T’24
Full Key Extraction of SNOW-V Using ML-assisted Power SCA
Harshit Saurabh, Suparna Kundu, Samarth Shivakumar Titti, Anupam Golder, K K Soundra Pandian, and
3 more authors
@article{10804221,author={Saurabh, Harshit and Kundu, Suparna and Titti, Samarth Shivakumar and Golder, Anupam and Soundra Pandian, K K and Li, Chaoyun and Karmakar, Angshuman and Das, Debayan},journal={IEEE Design & Test},title={Full Key Extraction of SNOW-V Using ML-assisted Power SCA},year={2024},volume={},number={},pages={1-1},doi={10.1109/MDAT.2024.3518455},}
ASIACRYPT’24
ZKFault: Fault attack analysis on zero-knowledge based post-quantum
digital signature schemes
Puja Mondal, Supriya Adhikary, Suparna Kundu, and Angshuman Karmakar
@article{DBLP:journals/iacr/MondalAKK24,author={Mondal, Puja and Adhikary, Supriya and Kundu, Suparna and Karmakar, Angshuman},title={ZKFault: Fault attack analysis on zero-knowledge based post-quantum
digital signature schemes},journal={Advances in Cryptology – ASIACRYPT},pages={1422},year={2024},}
@article{10716275,author={Han, KyungHyun and Lee, Wai-Kong and Karmakar, Angshuman and Yi, Myung-Kyu and Hwang, Seong Oun},journal={ IEEE Transactions on Emerging Topics in Computing },title={{ QuripfeNet: Quantum-Resistant IPFE-Based Neural Network }},year={2024},volume={},number={01},issn={2168-6750},pages={1-13},doi={10.1109/TETC.2024.3479193},url={https://doi.ieeecomputersociety.org/10.1109/TETC.2024.3479193},publisher={IEEE Computer Society},address={Los Alamitos, CA, USA},month=oct,}
TECS
Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms
Suparna Kundu, Quinten Norga, Angshuman Karmakar, Shreya Gangopadhyay, Jose Maria Bermudo Mera, and
1 more author
ACM Transactions on Embedded Computing Systems, Nov 2024
@article{10.1145/3696208,author={Kundu, Suparna and Norga, Quinten and Karmakar, Angshuman and Gangopadhyay, Shreya and Bermudo Mera, Jose Maria and Verbauwhede, Ingrid},title={Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms},year={2024},issue_date={January 2025},publisher={Association for Computing Machinery},address={New York, NY, USA},volume={24},number={1},issn={1539-9087},doi={10.1145/3696208},journal={ACM Transactions on Embedded Computing Systems},month=nov,articleno={10},numpages={40},keywords={Post-quantum cryptography, lattice-based cryptography, learning with rounding, key-encapsulation mechanism, software implementations, AVX2, Cortex-M4, hardware implementations, FPGA},}
IOTJ
Efficient TMVP-Based Polynomial Convolution on GPU for Post-Quantum
Cryptography Targeting IoT Applications
Muhammad Asfand Hafeez, Wai-Kong Lee, Angshuman Karmakar, and Seong Oun Hwang
@article{DBLP:journals/iotj/HafeezLKH24,author={Hafeez, Muhammad Asfand and Lee, Wai{-}Kong and Karmakar, Angshuman and Hwang, Seong Oun},title={Efficient TMVP-Based Polynomial Convolution on {GPU} for Post-Quantum
Cryptography Targeting IoT Applications},journal={{IEEE} Internet Things J.},volume={11},number={13},pages={23428--23443},year={2024},}
HOST’24
SNOW-SCA: ML-Assisted Side-Channel Attack on SNOW-V
Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, and
2 more authors
In IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Nov 2024
@inproceedings{DBLP:conf/host/SaurabhGTKLKD24,author={Saurabh, Harshit and Golder, Anupam and Titti, Samarth Shivakumar and Kundu, Suparna and Li, Chaoyun and Karmakar, Angshuman and Das, Debayan},title={{SNOW-SCA:} ML-Assisted Side-Channel Attack on {SNOW-V}},booktitle={{IEEE International Symposium on Hardware Oriented Security and Trust (HOST)}},pages={139--149},publisher={{IEEE}},year={2024},}
TCHES’24
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected
LWE-based KEM
Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, and
1 more author
@article{DBLP:journals/iacr/KunduCSKMV23,author={Kundu, Suparna and Chowdhury, Siddhartha and Saha, Sayandeep and Karmakar, Angshuman and Mukhopadhyay, Debdeep and Verbauwhede, Ingrid},title={Carry Your Fault: {A} Fault Propagation Attack on Side-Channel Protected
LWE-based {KEM}},journal={{IACR} Cryptol. ePrint Arch.},pages={1674},year={2024},timestamp={Thu, 09 Nov 2023 00:00:00 +0100},biburl={https://dblp.org/rec/journals/iacr/KunduCSKMV23.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
ACNS’24
A practical key-recovery attack on LWE-based key- encapsulation mechanism schemes using Rowhammer
Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, and Ingrid Verbauwhede
@misc{cryptoeprint:2023/1731,author={Mondal, Puja and Kundu, Suparna and Bhattacharya, Sarani and Karmakar, Angshuman and Verbauwhede, Ingrid},title={{A practical key-recovery attack on LWE-based key- encapsulation mechanism schemes using Rowhammer}},howpublished={22nd International Conference on Applied Cryptography and Network Security (ACNS), Abu Dhabi, UAE, 5-8 March, 2024},year={2024},}
2023
SPACE’23
On the Masking-Friendly Designs for Post-Quantum Cryptography
Suparna Kundu, Angshuman Karmakar, and Ingrid Verbauwhede
@misc{cryptoeprint:2023/1732,author={Kundu, Suparna and Karmakar, Angshuman and Verbauwhede, Ingrid},title={On the Masking-Friendly Designs for Post-Quantum Cryptography},howpublished={13th International Conference on Security, Privacy, and Applied Cryptographic Engineering 2023 (SPACE), 14 - 17 December 2023, IIT Roorkee},year={2023},}
INDOCRYPT’23
VDOO: A Short, Fast, Post-Quantum Multivariate Digital Signature Scheme
Anindya Ganguly, Angshuman Karmakar, and Nitin Saxena
@misc{vdoo,author={Ganguly, Anindya and Karmakar, Angshuman and Saxena, Nitin},title={VDOO: A Short, Fast, Post-Quantum Multivariate Digital Signature Scheme},howpublished={24th International Conference on Cryptology in India (INDOCRYPT 2023), 10-13 December 2023, BITS Pilani Goa Campus},year={2023},}
@article{DBLP:journals/iotj/KhanLKMMH23,author={Khan, Safiullah and Lee, Wai{-}Kong and Karmakar, Angshuman and Mera, Jose Maria Bermudo and Majeed, Abdul and Hwang, Seong Oun},title={Area-Time Efficient Implementation of {NIST} Lightweight Hash Functions
Targeting IoT Applications},journal={{IEEE} Internet of Things Journal},volume={10},number={9, May 1},pages={8083--8095},year={2023},doi={10.1109/JIOT.2022.3229516},timestamp={Wed, 17 May 2023 01:00:00 +0200},biburl={https://dblp.org/rec/journals/iotj/KhanLKMMH23.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
IOTJ
High Throughput Acceleration of Scabbard Key Exchange and Key Encapsulation
Mechanism Using Tensor Core on GPU for IoT Applications
Muhammad Asfand Hafeez, Wai-Kong Lee, Angshuman Karmakar, and Seong Oun Hwang
@article{DBLP:journals/iotj/HafeezLKH23,author={Hafeez, Muhammad Asfand and Lee, Wai{-}Kong and Karmakar, Angshuman and Hwang, Seong Oun},title={High Throughput Acceleration of Scabbard Key Exchange and Key Encapsulation
Mechanism Using Tensor Core on {GPU} for IoT Applications},journal={{IEEE} Internet Things Journal},volume={10},number={22},pages={19765--19781},year={2023},doi={10.1109/JIOT.2023.3282255},timestamp={Fri, 10 Nov 2023 00:00:00 +0100},biburl={https://dblp.org/rec/journals/iotj/HafeezLKH23.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
JSSC
A 334 \(μ\)W 0.158 mm\(^\mbox2\) ASIC for Post-Quantum
Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom-Cook
Multiplication
Archisman Ghosh, Jose Maria Bermudo Mera, Angshuman Karmakar, Debayan Das, Santosh Ghosh, and
2 more authors
@article{DBLP:journals/jssc/GhoshMKDGVS23,author={Ghosh, Archisman and Mera, Jose Maria Bermudo and Karmakar, Angshuman and Das, Debayan and Ghosh, Santosh and Verbauwhede, Ingrid and Sen, Shreyas},title={A 334 {\(\mu\)}W 0.158 mm\({}^{\mbox{2}}\) {ASIC} for Post-Quantum
Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom-Cook
Multiplication},journal={{IEEE} Journal of Solid State Circuits},volume={58},number={8},pages={2383--2398},year={2023},doi={10.1109/JSSC.2023.3253425},timestamp={Sat, 05 Aug 2023 01:00:00 +0200},biburl={https://dblp.org/rec/journals/jssc/GhoshMKDGVS23.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
TETC
A Fast RLWE-based IPFE Library and its Application to Privacy-preserving Biometric Authentication
Supriya Adhikary, and Angshuman Karmakar
IEEE Transactions on Emerging Topics in Computing, Nov 2023
@article{10106755,author={Adhikary, Supriya and Karmakar, Angshuman},journal={IEEE Transactions on Emerging Topics in Computing},title={A Fast RLWE-based IPFE Library and its Application to Privacy-preserving Biometric Authentication},year={2023},volume={},number={},pages={1-13},doi={10.1109/TETC.2023.3268003},}
TETC
cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption
Kyung Hyun Han, Wai-Kong Lee, Angshuman Karmakar, Jose Maria Bermudo Mera, and Seong Oun Hwang
IEEE Transactions on Emerging Topics in Computing, Nov 2023
@article{10089390,author={Han, Kyung Hyun and Lee, Wai-Kong and Karmakar, Angshuman and Mera, Jose Maria Bermudo and Hwang, Seong Oun},journal={IEEE Transactions on Emerging Topics in Computing},title={cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption},year={2023},volume={},number={},pages={1-16},doi={10.1109/TETC.2023.3261360},}
2022
TCAS-I
DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product
Instructions on GPUs
Wai-Kong Lee, Hwajeong Seo, Seong Oun Hwang, Ramachandra Achar, Angshuman Karmakar, and
1 more author
IEEE Transactions on Circuits and Systems I Regular Papers, Nov 2022
@article{DBLP:journals/tcasI/LeeSHAKM22,author={Lee, Wai{-}Kong and Seo, Hwajeong and Hwang, Seong Oun and Achar, Ramachandra and Karmakar, Angshuman and Mera, Jose Maria Bermudo},title={DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product
Instructions on GPUs},journal={{IEEE} Transactions on Circuits and Systems {I} Regular Papers},volume={69},number={9},pages={3591--3604},year={2022},url={https://doi.org/10.1109/TCSI.2022.3176966},doi={10.1109/TCSI.2022.3176966},timestamp={Mon, 28 Aug 2023 01:00:00 +0200},biburl={https://dblp.org/rec/journals/tcasI/LeeSHAKM22.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
TCHES
Polynomial multiplication on embedded vector architectures
Hanno Becker, Jose Maria Bermudo Mera, Angshuman Karmakar, Joseph Yiu, and Ingrid Verbauwhede
IACR Transactions on Cryptographic Hardware and Embedded Systems, Nov 2022
@article{DBLP:journals/tches/BeckerMKYV22,author={Becker, Hanno and Mera, Jose Maria Bermudo and Karmakar, Angshuman and Yiu, Joseph and Verbauwhede, Ingrid},title={Polynomial multiplication on embedded vector architectures},journal={{IACR} Transactions on Cryptographic Hardware and Embedded Systems},volume={2022},number={1},pages={482--505},year={2022},url={https://doi.org/10.46586/tches.v2022.i1.482-505},doi={10.46586/TCHES.V2022.I1.482-505},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/journals/tches/BeckerMKYV22.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
TECS
Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication
Catinca Mujdei, Lennert Wouters, Angshuman Karmakar, Arthur Beckers, Jose Maria Bermudo Mera, and
1 more author
ACM Transactions on Embedded Computing Systems, Nov 2022
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography. In this work we present correlation power analysis based side-channel analysis methodologies targeting every polynomial multiplication strategy for all lattice-based post-quantum key encapsulation mechanisms in the final round of the NIST post-quantum standardization procedure. We perform practical experiments on real side-channel measurements demonstrating that our method allows to extract the secret key from all lattice-based post-quantum key encapsulation mechanisms. Our analysis shows that the used polynomial multiplication strategy can significantly impact the time complexity of the attack.
@article{10.1145/3569420,author={Mujdei, Catinca and Wouters, Lennert and Karmakar, Angshuman and Beckers, Arthur and Mera, Jose Maria Bermudo and Verbauwhede, Ingrid},title={Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication},year={2022},publisher={Association for Computing Machinery},address={New York, NY, USA},issn={1539-9087},url={https://doi.org/10.1145/3569420},doi={10.1145/3569420},note={Just Accepted},journal={ACM Transactions on Embedded Computing Systems},month=nov,keywords={number-theoretic transform, Toom-Cook multiplication, post-quantum cryptography, side-channel analysis},}
SCN’22
Higher-Order Masked Saber
Suparna Kundu, Jan-Pieter D’Anvers, Michiel Van Beirendonck, Angshuman Karmakar, and Ingrid Verbauwhede
In Security and Cryptography for Networks - 13th International Conference,
SCN 2022, Amalfi, Italy, September 12-14, 2022, Proceedings, Nov 2022
@inproceedings{DBLP:conf/scn/KunduDBKV22,author={Kundu, Suparna and D'Anvers, Jan{-}Pieter and Beirendonck, Michiel Van and Karmakar, Angshuman and Verbauwhede, Ingrid},title={Higher-Order Masked Saber},booktitle={Security and Cryptography for Networks - 13th International Conference,
{SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},pages={93--116},year={2022},crossref={DBLP:conf/scn/2022},url={https://doi.org/10.1007/978-3-031-14791-3\_5},doi={10.1007/978-3-031-14791-3\_5},timestamp={Sat, 10 Sep 2022 01:00:00 +0200},biburl={https://dblp.org/rec/conf/scn/KunduDBKV22.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
CICC’22
A 334uW 0.158mm2 Saber Learning with Rounding based Post-Quantum Crypto
Accelerator
Archisman Ghosh, Jose Maria Bermudo Mera, Angshuman Karmakar, Debayan Das, Santosh Ghosh, and
2 more authors
In IEEE Custom Integrated Circuits Conference, CICC 2022, Newport
Beach, CA, USA, April 24-27, 2022, Nov 2022
@inproceedings{DBLP:conf/cicc/GhoshMKDGVS22,author={Ghosh, Archisman and Mera, Jose Maria Bermudo and Karmakar, Angshuman and Das, Debayan and Ghosh, Santosh and Verbauwhede, Ingrid and Sen, Shreyas},title={A 334uW 0.158mm2 Saber Learning with Rounding based Post-Quantum Crypto
Accelerator},booktitle={{IEEE} Custom Integrated Circuits Conference, {CICC} 2022, Newport
Beach, CA, USA, April 24-27, 2022},pages={1--2},year={2022},crossref={DBLP:conf/cicc/2022},url={https://doi.org/10.1109/CICC53496.2022.9772859},doi={10.1109/CICC53496.2022.9772859},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/conf/cicc/GhoshMKDGVS22.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
Jose Maria Bermudo Mera, Angshuman Karmakar, Tilen Marc, and Azam Soleimanian
In Public-Key Cryptography - PKC 2022 - 25th IACR International Conference
on Practice and Theory of Public-Key Cryptography, Virtual Event,
March 8-11, 2022, Proceedings, Part II, Nov 2022
@inproceedings{DBLP:conf/pkc/MeraKMS22,author={Mera, Jose Maria Bermudo and Karmakar, Angshuman and Marc, Tilen and Soleimanian, Azam},title={Efficient Lattice-Based Inner-Product Functional Encryption},booktitle={Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
on Practice and Theory of Public-Key Cryptography, Virtual Event,
March 8-11, 2022, Proceedings, Part {II}},pages={163--193},year={2022},crossref={DBLP:conf/pkc/2022-2},url={https://doi.org/10.1007/978-3-030-97131-1\_6},doi={10.1007/978-3-030-97131-1\_6},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/conf/pkc/MeraKMS22.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
2021
JETC
A Side-Channel-Resistant Implementation of SABER
Michiel Van Beirendonck, Jan-Pieter D’Anvers, Angshuman Karmakar, Josep Balasch, and Ingrid Verbauwhede
ACM Journal on Emerging Technologies in Computing Systems, Nov 2021
@article{DBLP:journals/jetc/BeirendonckDKBV21,author={Beirendonck, Michiel Van and D'Anvers, Jan{-}Pieter and Karmakar, Angshuman and Balasch, Josep and Verbauwhede, Ingrid},title={A Side-Channel-Resistant Implementation of {SABER}},journal={{ACM} Journal on Emerging Technologies in Computing Systems},volume={17},number={2},pages={10:1--10:26},year={2021},url={https://doi.org/10.1145/3429983},doi={10.1145/3429983},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/journals/jetc/BeirendonckDKBV21.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
TCHES
Scabbard: a suite of efficient learning with rounding key-encapsulation
mechanisms
Jose Maria Bermudo Mera, Angshuman Karmakar, Suparna Kundu, and Ingrid Verbauwhede
IACR Trans. Cryptogr. Hardw. Embed. Syst., Nov 2021
@article{DBLP:journals/tches/MeraKKV21,author={Mera, Jose Maria Bermudo and Karmakar, Angshuman and Kundu, Suparna and Verbauwhede, Ingrid},title={Scabbard: a suite of efficient learning with rounding key-encapsulation
mechanisms},journal={{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},volume={2021},number={4},pages={474--509},year={2021},url={https://doi.org/10.46586/tches.v2021.i4.474-509},doi={10.46586/TCHES.V2021.I4.474-509},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/journals/tches/MeraKKV21.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
2020
TCHES
Time-memory trade-off in Toom-Cook multiplication: an application
to module-lattice based cryptography
Jose Maria Bermudo Mera, Angshuman Karmakar, and Ingrid Verbauwhede
IACR Transactions on Cryptographic Hardware and Embedded Systems, Nov 2020
@article{DBLP:journals/tches/MeraKV20,author={Mera, Jose Maria Bermudo and Karmakar, Angshuman and Verbauwhede, Ingrid},title={Time-memory trade-off in Toom-Cook multiplication: an application
to module-lattice based cryptography},journal={{IACR} Transactions on Cryptographic Hardware and Embedded Systems},volume={2020},number={2},pages={222--244},year={2020},url={https://doi.org/10.13154/tches.v2020.i2.222-244},doi={10.13154/TCHES.V2020.I2.222-244},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/journals/tches/MeraKV20.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
CARDIS’20
Optimized Software Implementations for the Lightweight Encryption
Scheme ForkAE
Arne Deprez, Elena Andreeva, Jose Maria Bermudo Mera, Angshuman Karmakar, and Antoon Purnal
In Smart Card Research and Advanced Applications - 19th International
Conference, CARDIS 2020, Virtual Event, November 18-19, 2020, Revised
Selected Papers, Nov 2020
@inproceedings{DBLP:conf/cardis/DeprezAMKP20,author={Deprez, Arne and Andreeva, Elena and Mera, Jose Maria Bermudo and Karmakar, Angshuman and Purnal, Antoon},title={Optimized Software Implementations for the Lightweight Encryption
Scheme ForkAE},booktitle={Smart Card Research and Advanced Applications - 19th International
Conference, {CARDIS} 2020, Virtual Event, November 18-19, 2020, Revised
Selected Papers},pages={68--83},year={2020},crossref={DBLP:conf/cardis/2020},url={https://doi.org/10.1007/978-3-030-68487-7\_5},doi={10.1007/978-3-030-68487-7\_5},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/conf/cardis/DeprezAMKP20.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
DAC’20
Compact domain-specific co-processor for accelerating module lattice-based
KEM
Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, and Ingrid Verbauwhede
In 57th ACM/IEEE Design Automation Conference, DAC 2020, San Francisco,
CA, USA, July 20-24, 2020, Nov 2020
@inproceedings{DBLP:conf/dac/MeraTKRV20,author={Mera, Jose Maria Bermudo and Turan, Furkan and Karmakar, Angshuman and Roy, Sujoy Sinha and Verbauwhede, Ingrid},title={Compact domain-specific co-processor for accelerating module lattice-based
{KEM}},booktitle={57th {ACM/IEEE} Design Automation Conference, {DAC} 2020, San Francisco,
CA, USA, July 20-24, 2020},pages={1--6},year={2020},crossref={DBLP:conf/dac/2020},url={https://doi.org/10.1109/DAC18072.2020.9218727},doi={10.1109/DAC18072.2020.9218727},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/conf/dac/MeraTKRV20.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
2019
DAC’19
Pushing the speed limit of constant-time discrete Gaussian sampling.
A case study on the Falcon signature scheme
Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, and Ingrid Verbauwhede
In Proceedings of the 56th Annual Design Automation Conference 2019,
DAC 2019, Las Vegas, NV, USA, June 02-06, 2019, Nov 2019
@inproceedings{DBLP:conf/dac/KarmakarRVV19,author={Karmakar, Angshuman and Roy, Sujoy Sinha and Vercauteren, Frederik and Verbauwhede, Ingrid},title={Pushing the speed limit of constant-time discrete Gaussian sampling.
{A} case study on the Falcon signature scheme},booktitle={Proceedings of the 56th Annual Design Automation Conference 2019,
{DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019},pages={88},year={2019},crossref={DBLP:conf/dac/2019},url={https://doi.org/10.1145/3316781.3317887},doi={10.1145/3316781.3317887},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/conf/dac/KarmakarRVV19.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
2018
ToC
Constant-Time Discrete Gaussian Sampling
Angshuman Karmakar, Sujoy Sinha Roy, Oscar Reparaz, Frederik Vercauteren, and Ingrid Verbauwhede
@article{DBLP:journals/tc/KarmakarRRVV18,author={Karmakar, Angshuman and Roy, Sujoy Sinha and Reparaz, Oscar and Vercauteren, Frederik and Verbauwhede, Ingrid},title={Constant-Time Discrete Gaussian Sampling},journal={{IEEE} Transactions on Computers},volume={67},number={11},pages={1561--1571},year={2018},url={https://doi.org/10.1109/TC.2018.2814587},doi={10.1109/TC.2018.2814587},timestamp={Fri, 02 Nov 2018 00:00:00 +0100},biburl={https://dblp.org/rec/journals/tc/KarmakarRRVV18.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
TCHES
Saber on ARM CCA-secure module lattice-based key encapsulation on
ARM
Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy, and Ingrid Verbauwhede
IACR Transactions on Cryptographic Hardware and Embedded Systems, Nov 2018
@article{DBLP:journals/tches/KarmakarMRV18,author={Karmakar, Angshuman and Mera, Jose Maria Bermudo and Roy, Sujoy Sinha and Verbauwhede, Ingrid},title={Saber on {ARM} CCA-secure module lattice-based key encapsulation on
{ARM}},journal={{IACR} Transactions on Cryptographic Hardware and Embedded Systems},volume={2018},number={3},pages={243--266},year={2018},url={https://doi.org/10.13154/tches.v2018.i3.243-266},doi={10.13154/TCHES.V2018.I3.243-266},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/journals/tches/KarmakarMRV18.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
AFRICACRYPT’18
Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure
KEM
Jan-Pieter D’Anvers, Angshuman Karmakar, Sujoy Sinha Roy, and Frederik Vercauteren
In Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference
on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings, Nov 2018
@inproceedings{DBLP:conf/africacrypt/DAnversKRV18,author={D'Anvers, Jan{-}Pieter and Karmakar, Angshuman and Roy, Sujoy Sinha and Vercauteren, Frederik},title={Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure
{KEM}},booktitle={Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},pages={282--305},year={2018},crossref={DBLP:conf/africacrypt/2018},url={https://doi.org/10.1007/978-3-319-89339-6\_16},doi={10.1007/978-3-319-89339-6\_16},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/conf/africacrypt/DAnversKRV18.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
2016
SPACE’16
Ring-LWE: Applications to Cryptography and Their Efficient Realization
Sujoy Sinha Roy, Angshuman Karmakar, and Ingrid Verbauwhede
In Security, Privacy, and Applied Cryptography Engineering - 6th International
Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016,
Proceedings, Nov 2016
@inproceedings{DBLP:conf/space/RoyKV16,author={Roy, Sujoy Sinha and Karmakar, Angshuman and Verbauwhede, Ingrid},title={Ring-LWE: Applications to Cryptography and Their Efficient Realization},booktitle={Security, Privacy, and Applied Cryptography Engineering - 6th International
Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
Proceedings},pages={323--331},year={2016},crossref={DBLP:conf/space/2016},url={https://doi.org/10.1007/978-3-319-49445-6\_18},doi={10.1007/978-3-319-49445-6\_18},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/conf/space/RoyKV16.bib},bibsource={dblp computer science bibliography, https://dblp.org},}
WAIFI’16
Efficient Finite Field Multiplication for Isogeny Based Post Quantum
Cryptography
Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, and Ingrid Verbauwhede
In Arithmetic of Finite Fields - 6th International Workshop, WAIFI
2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers, Nov 2016
@inproceedings{DBLP:conf/waifi/KarmakarRVV16,author={Karmakar, Angshuman and Roy, Sujoy Sinha and Vercauteren, Frederik and Verbauwhede, Ingrid},title={Efficient Finite Field Multiplication for Isogeny Based Post Quantum
Cryptography},booktitle={Arithmetic of Finite Fields - 6th International Workshop, {WAIFI}
2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers},pages={193--207},year={2016},crossref={DBLP:conf/waifi/2016},url={https://doi.org/10.1007/978-3-319-55227-9\_14},doi={10.1007/978-3-319-55227-9\_14},timestamp={Sat, 30 Sep 2023 01:00:00 +0200},biburl={https://dblp.org/rec/conf/waifi/KarmakarRVV16.bib},bibsource={dblp computer science bibliography, https://dblp.org},}