Janaka Alawatugoda
Janaka Alawatugoda
Associate Researcher - Assistant Professor, Rabdan Academy, UAE
Verified email at
Cited by
Cited by
Modelling after-the-fact leakage for key exchange
J Alawatugoda, D Stebila, C Boyd
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Continuous after-the-fact leakage-resilient key exchange
J Alawatugoda, C Boyd, D Stebila
australasian conference on information security and privacy, 258-273, 2014
Continuous after-the-fact leakage-resilient eck-secure key exchange
J Alawatugoda, D Stebila, C Boyd
IMA international conference on cryptography and coding, 277-294, 2015
Countermeasures against Bernstein's remote cache timing attack
J Alawatugoda, D Jayasinghe, R Ragel
2011 6th International Conference on Industrial and Information Systems, 43-48, 2011
Protecting encrypted cookies from compression side-channel attacks
J Alawatugoda, D Stebila, C Boyd
International Conference on Financial Cryptography and Data Security, 86-106, 2015
On the leakage-resilient key exchange
J Alawatugoda
Journal of Mathematical Cryptology 11 (4), 215-269, 2017
Software implementation level countermeasures against the cache timing attack on advanced encryption standard
U Herath, J Alawatugoda, R Ragel
2013 IEEE 8th International Conference on Industrial and Information Systems …, 2013
Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting
S Chakraborty, J Alawatugoda, C Pandu Rangan
International Conference on Provable Security, 167-187, 2017
Generic construction of an eCK -secure key exchange protocol in the standard model
J Alawatugoda
International Journal of Information Security 16 (5), 541-557, 2017
BAT—Block Analytics Tool Integrated with Blockchain Based IoT Platform
C Edussuriya, K Vithanage, N Bandara, J Alawatugoda, M Sandirigama, ...
Electronics 9 (9), 1525, 2020
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
I Sankalpa, T Dhanushka, N Amarasinghe, J Alawathugoda, R Ragel
2016 Manufacturing & Industrial Engineering Symposium (MIES), 1-5, 2016
New approach to practical leakage-resilient public-key cryptography
S Chakraborty, J Alawatugoda, CP Rangan
Journal of Mathematical Cryptology 14 (1), 172-201, 2020
Review on leakage resilient key exchange security models
CCZ Wei, CC Wen, J Alawatugoda
International Journal of Communication Networks and Information Security 11 …, 2019
Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack
J Alupotha, S Prasadi, J Alawatugoda, R Ragel, M Fawsan
2017 IEEE International Conference on Industrial and Information Systems …, 2017
On the leakage resilience of secure channel establishment
JAB Alawatugoda
Queensland University of Technology, 2015
Standard model leakage-resilient authenticated key exchange using inner-product extractors
J Alawatugoda, T Okamoto
Designs, Codes and Cryptography, 1-21, 2022
On power analysis attacks against hardware stream ciphers
RD Silva, I Navaratna, M Kumarasiri, J Alawatugoda, CC Wen
International Journal of Information and Computer Security 17 (1-2), 21-35, 2022
Public-key encryption in the standard model against strong leakage adversary
J Alawatugoda
The Computer Journal 63 (12), 1904-1914, 2020
Analysis of Four Historical Ciphers Against Known Plaintext Frequency Statistical Attack
CC Wen, L Samylingam, I Darmawan, PSS Palaniappan, CFM Foozy, ...
International Journal of Integrated Engineering 10 (6), 2018
On Advances of Lattice-Based Cryptographic Schemes and Their Implementations
H Bandara, Y Herath, T Weerasundara, J Alawatugoda
Cryptography 6 (4), 56, 2022
The system can't perform the operation now. Try again later.
Articles 1–20