What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Chester Rebeiro
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/dsn
Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks.
Nikhilesh Singh
Chester Rebeiro
2025
journals/tches
TESLA: Trusted Execution Support for Legacy Embedded Applications.
Saltanat Firdous Allaqband
Asutosh Brahma
Sai Venkata Krishnan V
Arjun Menon
Chester Rebeiro
2024
conf/uss
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors.
Pallavi Borkar
Chen Chen
Mohamadreza Rostami
Nikhilesh Singh
Rahul Kande
Ahmad-Reza Sadeghi
Chester Rebeiro
Jeyavijayan Rajendran
2023
journals/tches
FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software.
Keerthi K.
Chester Rebeiro
2023
conf/dsn
Secure Compiler Framework to Design Fault Attack Resistant Software.
Keerthi K.
Chester Rebeiro
2023
conf/dsn
YODA: Covert Communication Channel over Public DNS Resolvers.
Sandip Saha
Sareena Karapoola
Chester Rebeiro
V. Kamakoti
2022
conf/uss
JUGAAD: Comprehensive Malware Behavior-as-a-Service.
Sareena Karapoola
Nikhilesh Singh
Chester Rebeiro
Kamakoti Veezhinathan
2022
conf/icbc2
Privacy-Preserving Decentralized Exchange Marketplaces.
Kavya Govindarajan
Dhinakaran Vinayagamurthy
Praveen Jayachandran
Chester Rebeiro
2021
journals/joc
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers.
Chester Rebeiro
Debdeep Mukhopadhyay
2020
journals/tches
FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers.
Keerthi K.
Indrani Roy
Chester Rebeiro
Aritra Hazra
Swarup Bhunia
2020
conf/host
PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance.
Muhammad Arsath K. F
Vinod Ganesan
Rahul Bodduna
Chester Rebeiro
2019
conf/ccs
Towards Identifying Early Indicators of a Malware Infection.
Sareena Karapoola
Chester Rebeiro
Unnati Parekh
Kamakoti Veezhinathan
2014
conf/africacrypt
DRECON: DPA Resistant Encryption by Construction.
Suvadeep Hajra
Chester Rebeiro
Shivam Bhasin
Gaurav Bajaj
Sahil Sharma
Sylvain Guilley
Debdeep Mukhopadhyay
2013
journals/tifs
Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks.
Chester Rebeiro
Phuong Ha Nguyen
Debdeep Mukhopadhyay
Axel Poschmann
2012
journals/tifs
Boosting Profiled Cache Timing Attacks With A Priori Analysis.
Chester Rebeiro
Debdeep Mukhopadhyay
2012
conf/ches
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs.
Chester Rebeiro
Sujoy Sinha Roy
Debdeep Mukhopadhyay
2011
conf/ctrsa
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns.
Chester Rebeiro
Debdeep Mukhopadhyay
2006
conf/cans
Bitslice Implementation of AES.
Chester Rebeiro
A. David Selvakumar
A. S. L. Devi
Coauthors
A. David Selvakumar
(1)
A. S. L. Devi
(1)
Ahmad-Reza Sadeghi
(1)
Aritra Hazra
(1)
Arjun Menon
(1)
Asutosh Brahma
(1)
Axel Poschmann
(1)
Chen Chen
(1)
Chester Rebeiro
(18)
Debdeep Mukhopadhyay
(6)
Dhinakaran Vinayagamurthy
(1)
Gaurav Bajaj
(1)
Indrani Roy
(1)
Jeyavijayan Rajendran
(1)
Kamakoti Veezhinathan
(2)
Kavya Govindarajan
(1)
Keerthi K.
(3)
Mohamadreza Rostami
(1)
Muhammad Arsath K. F
(1)
Nikhilesh Singh
(3)
Pallavi Borkar
(1)
Phuong Ha Nguyen
(1)
Praveen Jayachandran
(1)
Rahul Bodduna
(1)
Rahul Kande
(1)
Sahil Sharma
(1)
Sai Venkata Krishnan V
(1)
Saltanat Firdous Allaqband
(1)
Sandip Saha
(1)
Sareena Karapoola
(3)
Shivam Bhasin
(1)
Sujoy Sinha Roy
(1)
Suvadeep Hajra
(1)
Swarup Bhunia
(1)
Sylvain Guilley
(1)
Unnati Parekh
(1)
V. Kamakoti
(1)
Vinod Ganesan
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to