Follow
Janaka Alawatugoda
Janaka Alawatugoda
Associate Researcher - Assistant Professor, Rabdan Academy, UAE
Verified email at ra.ac.ae
Title
Cited by
Cited by
Year
Modelling after-the-fact leakage for key exchange
J Alawatugoda, D Stebila, C Boyd
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
512014
Continuous after-the-fact leakage-resilient key exchange
J Alawatugoda, C Boyd, D Stebila
australasian conference on information security and privacy, 258-273, 2014
382014
Continuous after-the-fact leakage-resilient eck-secure key exchange
J Alawatugoda, D Stebila, C Boyd
IMA international conference on cryptography and coding, 277-294, 2015
292015
Countermeasures against Bernstein's remote cache timing attack
J Alawatugoda, D Jayasinghe, R Ragel
2011 6th International Conference on Industrial and Information Systems, 43-48, 2011
162011
Protecting encrypted cookies from compression side-channel attacks
J Alawatugoda, D Stebila, C Boyd
International Conference on Financial Cryptography and Data Security, 86-106, 2015
122015
On the leakage-resilient key exchange
J Alawatugoda
Journal of Mathematical Cryptology 11 (4), 215-269, 2017
102017
Software implementation level countermeasures against the cache timing attack on advanced encryption standard
U Herath, J Alawatugoda, R Ragel
2013 IEEE 8th International Conference on Industrial and Information Systems …, 2013
82013
Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting
S Chakraborty, J Alawatugoda, C Pandu Rangan
International Conference on Provable Security, 167-187, 2017
62017
Generic construction of an eCK -secure key exchange protocol in the standard model
J Alawatugoda
International Journal of Information Security 16 (5), 541-557, 2017
6*2017
BAT—Block Analytics Tool Integrated with Blockchain Based IoT Platform
C Edussuriya, K Vithanage, N Bandara, J Alawatugoda, M Sandirigama, ...
Electronics 9 (9), 1525, 2020
42020
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
I Sankalpa, T Dhanushka, N Amarasinghe, J Alawathugoda, R Ragel
2016 Manufacturing & Industrial Engineering Symposium (MIES), 1-5, 2016
32016
New approach to practical leakage-resilient public-key cryptography
S Chakraborty, J Alawatugoda, CP Rangan
Journal of Mathematical Cryptology 14 (1), 172-201, 2020
22020
Review on leakage resilient key exchange security models
CCZ Wei, CC Wen, J Alawatugoda
International Journal of Communication Networks and Information Security 11 …, 2019
2*2019
Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack
J Alupotha, S Prasadi, J Alawatugoda, R Ragel, M Fawsan
2017 IEEE International Conference on Industrial and Information Systems …, 2017
22017
On the leakage resilience of secure channel establishment
JAB Alawatugoda
Queensland University of Technology, 2015
22015
Standard model leakage-resilient authenticated key exchange using inner-product extractors
J Alawatugoda, T Okamoto
Designs, Codes and Cryptography, 1-21, 2022
12022
On power analysis attacks against hardware stream ciphers
RD Silva, I Navaratna, M Kumarasiri, J Alawatugoda, CC Wen
International Journal of Information and Computer Security 17 (1-2), 21-35, 2022
12022
Public-key encryption in the standard model against strong leakage adversary
J Alawatugoda
The Computer Journal 63 (12), 1904-1914, 2020
12020
Analysis of Four Historical Ciphers Against Known Plaintext Frequency Statistical Attack
CC Wen, L Samylingam, I Darmawan, PSS Palaniappan, CFM Foozy, ...
International Journal of Integrated Engineering 10 (6), 2018
12018
On Advances of Lattice-Based Cryptographic Schemes and Their Implementations
H Bandara, Y Herath, T Weerasundara, J Alawatugoda
Cryptography 6 (4), 56, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20