What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sujoy Sinha Roy
Google Scholar
ORCID:
0000-0002-9805-5389
26
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
REED: Chiplet-based Accelerator for Fully Homomorphic Encryption.
Aikata Aikata
Ahmet Can Mert
Sunmin Kwon
Maxim Deryabin
Sujoy Sinha Roy
2025
journals/cic
Accelerating Isogeny Walks for VDF Evaluation.
David Jacquemin
Anisha Mukherjee
Ahmet Can Mert
Sujoy Sinha Roy
2025
journals/cic
Revisiting Module Lattice-based Homomorphic Encryption and Application to Secure-MPC.
Anisha Mukherjee
Sujoy Sinha Roy
2025
conf/africacrypt
Simple Power Analysis Attack on SQIsign.
Anisha Mukherjee
Maciej Czuprynko
David Jacquemin
Péter Kutas
Sujoy Sinha Roy
2025
conf/africacrypt
Correlation Power Analysis of LESS and CROSS.
Maciej Czuprynko
Anisha Mukherjee
Sujoy Sinha Roy
2025
journals/tches
Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time.
Florian Hirner
Florian Krieger
Constantin Piber
Sujoy Sinha Roy
2024
journals/tches
ModHE: Modular Homomorphic Encryption Using Module Lattices Potentials and Limitations.
Anisha Mukherjee
Aikata
Ahmet Can Mert
Yongwoo Lee
Sunmin Kwon
Maxim Deryabin
Sujoy Sinha Roy
2024
conf/ccs
Whipping the Multivariate-based MAYO Signature Scheme using Hardware Platforms.
Florian Hirner
Michael Streibl
Florian Krieger
Ahmet Can Mert
Sujoy Sinha Roy
2024
conf/crypto
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration.
Andrey Kim
Ahmet Can Mert
Anisha Mukherjee
Aikata
Maxim Deryabin
Sunmin Kwon
HyungChul Kang
Sujoy Sinha Roy
2024
conf/asiaccs
REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography.
Samuel Pagliarini
Aikata
Malik Imran
Sujoy Sinha Roy
2023
journals/tches
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data.
Ahmet Can Mert
Aikata
Sunmin Kwon
Youngsam Shin
Donghoon Yoo
Yongwoo Lee
Sujoy Sinha Roy
2023
journals/tches
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography.
Aikata
Andrea Basso
Gaëtan Cassiers
Ahmet Can Mert
Sujoy Sinha Roy
2022
journals/tches
Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs.
Prasanna Ravi
Martianus Frederic Ezerman
Shivam Bhasin
Anupam Chattopadhyay
Sujoy Sinha Roy
2022
journals/tifs
On Exploiting Message Leakage in (Few) NIST PQC Candidates for Practical Message Recovery Attacks.
Prasanna Ravi
Shivam Bhasin
Sujoy Sinha Roy
Anupam Chattopadhyay
2021
conf/ccs
Design Space Exploration of SABER in 65nm ASIC.
Malik Imran
Felipe Almeida
Jaan Raik
Andrea Basso
Sujoy Sinha Roy
Samuel Pagliarini
2020
journals/tches
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware.
Sujoy Sinha Roy
Andrea Basso
2020
journals/tches
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs.
Prasanna Ravi
Sujoy Sinha Roy
Anupam Chattopadhyay
Shivam Bhasin
2018
journals/tches
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM.
Angshuman Karmakar
Jose Maria Bermudo Mera
Sujoy Sinha Roy
Ingrid Verbauwhede
2018
conf/africacrypt
Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM.
Jan-Pieter D'Anvers
Angshuman Karmakar
Sujoy Sinha Roy
Frederik Vercauteren
2015
conf/ches
Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates.
Sujoy Sinha Roy
Kimmo Järvinen
Ingrid Verbauwhede
2015
conf/ches
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation.
Sujoy Sinha Roy
Kimmo Järvinen
Frederik Vercauteren
Vassil S. Dimitrov
Ingrid Verbauwhede
2015
conf/ches
Efficient Ring-LWE Encryption on 8-Bit AVR Processors.
Zhe Liu
Hwajeong Seo
Sujoy Sinha Roy
Johann Großschädl
Howon Kim
Ingrid Verbauwhede
2015
conf/ches
A Masked Ring-LWE Implementation.
Oscar Reparaz
Sujoy Sinha Roy
Frederik Vercauteren
Ingrid Verbauwhede
2014
conf/ches
Compact Ring-LWE Cryptoprocessor.
Sujoy Sinha Roy
Frederik Vercauteren
Nele Mentens
Donald Donglong Chen
Ingrid Verbauwhede
2013
conf/sacrypt
High Precision Discrete Gaussian Sampling on FPGAs.
Sujoy Sinha Roy
Frederik Vercauteren
Ingrid Verbauwhede
2012
conf/ches
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs.
Chester Rebeiro
Sujoy Sinha Roy
Debdeep Mukhopadhyay
Coauthors
Ahmet Can Mert
(7)
Aikata
(5)
Aikata Aikata
(1)
Andrea Basso
(3)
Andrey Kim
(1)
Angshuman Karmakar
(2)
Anisha Mukherjee
(6)
Anupam Chattopadhyay
(3)
Chester Rebeiro
(1)
Constantin Piber
(1)
David Jacquemin
(2)
Debdeep Mukhopadhyay
(1)
Donald Donglong Chen
(1)
Donghoon Yoo
(1)
Felipe Almeida
(1)
Florian Hirner
(2)
Florian Krieger
(2)
Frederik Vercauteren
(5)
Gaëtan Cassiers
(1)
Howon Kim
(1)
Hwajeong Seo
(1)
HyungChul Kang
(1)
Ingrid Verbauwhede
(7)
Jaan Raik
(1)
Jan-Pieter D'Anvers
(1)
Johann Großschädl
(1)
Jose Maria Bermudo Mera
(1)
Kimmo Järvinen
(2)
Maciej Czuprynko
(2)
Malik Imran
(2)
Martianus Frederic Ezerman
(1)
Maxim Deryabin
(3)
Michael Streibl
(1)
Nele Mentens
(1)
Oscar Reparaz
(1)
Péter Kutas
(1)
Prasanna Ravi
(3)
Samuel Pagliarini
(2)
Shivam Bhasin
(3)
Sujoy Sinha Roy
(26)
Sunmin Kwon
(4)
Vassil S. Dimitrov
(1)
Yongwoo Lee
(2)
Youngsam Shin
(1)
Zhe Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to